Please turn on your JavaScript for this page to function normally.
What makes a good information security professional?

Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …

Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Huge GPU cluster makes password hacking a breeze

Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task. The latest of the …

(IN)SECURE Magazine issue 36 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …

Video: Incident response and cloud computing

Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …

IRISSCERT warns Irish businesses on key cybercrime threats

IRISSCERT is to hold its fourth annual cybercrime conference this coming Thursday the 22nd of November where they will highlight key trends and issues that businesses in …

Life cycle and detection of an exploit kit

As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …

Hack In The Box celebrates a decade of security conferences

Last week’s Hack In The Box Security Conference saw the return of over 40 of the most popular speakers from the last decade presenting in a triple track format over 2 …

Security implications of the rise of silicon-based life forms

Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …

Security industry needs a healthy job market

The information security industry is facing an inflationary spiral, which is both unsustainable and bad for the economy as the skills gap in information security continues to …

RSA helps thwart smash-and-grab credential theft

At RSA Conference Europe 2012 in London, RSA introduced a new technology designed to protect passwords and other credentials and secrets stored in databases from cyber …

Free mobile app profiler for risk assessment

At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …

Don't miss

Cybersecurity news