Please turn on your JavaScript for this page to function normally.
OverSight
OverSight detects when Mac malware uses built-in camera, mic

Users who want to be warned each time their Mac’s camera and microphone are switched on – either by a legitimate process or, more importantly, by malware – …

IP EXPO 2016
Photos: IP EXPO Europe 2016

With six IT events under one roof, 300+ exhibitors and 300+ free to attend seminar sessions, IP EXPO Europe is taking place this week in London, UK. IP EXPO Europe now …

open source
OpenChain Project: Best practices for an ecosystem of open source software compliance

Yesterday at LinuxCon in Berlin, The Linux Foundation announced that the OpenChain Project has established its first set of requirements and best practices for consistent free …

IoT Village
IoT Village uncovers 47 security vulnerabilities across 23 devices

New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new …

Borderless Cyber Europe
Andrus Ansip to keynote Borderless Cyber Europe

Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations can no longer adequately defend …

Infosecurity Europe 2016
Photos: Infosecurity Europe 2016

Taking place in London right now is Infosecurity Europe 2016. Europe’s largest information security event has more companies exhibiting than ever before, and a …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

Black Hat
How to get your talk accepted at Black Hat

There’s a wealth of technical information security conferences all over the globe, but Black Hat USA is the only one that gathers so many of the world’s top …

HITBSecConf
Submissions open for CommSec Track at HITBSecConf Amsterdam

Alongside HITB2016AMS’s CommSec Exhibition Village there will be a separate CommSec Track (26 – 27 May). Hackers, makers, builders and breakers are invited to send …

Human element of security to the fore at IRISSCON 2015

The most neglected part of security is the human factor – and yet it’s also the most vulnerable. Several of the speakers at the recently held IRISSCON cyber crime conference …

BadBarcode: Poisoned barcodes can be used to take over systems

Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …

Don't miss

Cybersecurity news