Please turn on your JavaScript for this page to function normally.
Automated hacking

The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …

Facebook Developer World HACK 2012 announced

Facebook announced the Facebook Developer World HACK 2012, a series of events hosted around the world throughout August and September. Facebook Developer HACKs are day-long …

Join the Smart Grid Security Virtual Summit

On Thursday, August 9, Smart Grid Observer will host a full-day Smart Grid Security Virtual Summit. The event brings together a range of top utility practitioners and security …

SANS announces line-up for digital forensics event

SANS Institute has announced its roster of speakers presenting at the 3rd annual European Digital Forensics and Incident Response Summit (DFIR) in Prague on the 7th of …

1,500 severe security events detected on Black Hat WLAN

The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …

Researchers beat Google’s Bouncer

When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …

Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

First holistic security platform unveiled at Black Hat

AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

CryptoAuditor: Privileged user access auditing

SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …

Microsoft Security Toolkit delivers new defensive technology

Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …

Free advanced evasion technique testing software

Stonesoft released Evader, the first software-based testing tool that empowers organizations to test their network security solutions’ ability to withstand advanced …

Don't miss

Cybersecurity news