Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
How to spot APT attacks
With the proliferation of Advanced Persistent Threats (APTs), it’s paramount for those who are charged with defending the systems and networks of likely targets to know …
Investigating clever scamming techniques and their evolution
Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, …
Facebook scams and why users fall for them
The two main reasons why scammers are grateful for Facebook’s existence are the fact that they can easily access a great number of people in a short period of time, and …
Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks
Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …
Data security tips for healthcare organizations
It’s that time of year when everyone wants to be healthier. Eat better. Lose weight. Manage stress. Save money. These rank as peoples’ top New Year’s …
Hacking Web Apps
Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …
What DDoS attacks reveal about your security infrastructure
As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not …
BYOD challenges for large organizations
Alexander Hav?¤ng is the CTO at Procera Networks and in this interview explains enterprise challenges with BYOD. BYOD is one of the biggest buzzwords in recent years. In …
Top 10 risks found by your auditor
KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Ten tips for mobile security
Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption