Please turn on your JavaScript for this page to function normally.
Bruce Schneier: The battle for power on the Internet

Bruce Schneier gives us a glimpse of the future of the internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.

Video: Cracking corporate passwords

Cracking corporate passwords is different than cracking public MD5 leaks off of pastebin. Corporate passwords are not in the same formats you are used to, they require capital …

Video: NSA hearing in the European Parliament

Embedded below is the full video of the NSA hearing in the Human Rights Committee (LIBE) in the European Parliament 5 September 2013, which runs at 03:25 hours. Courtesy of …

Online privacy: How did we get here?

As technology has evolved over the past two centuries, so have our expectations about privacy. This new digital world allows us to connect with each other with increasing …

Bruce Schneier on power and security

In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …

Video with NSA whistleblower Edward Snowden

This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.

Hacking charge stations for electric cars

The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that …

Pirate Party on data protection

In the video below, Christian Engstr?¶m, Pirate Party MEP, discusses data protection. A common regulation to cover all of Europe is one of the arguments presented by …

A closer look at Hack In The Box 2013 Amsterdam

Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …

Sophisticated threats and thinking like the attacker

Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …

Controlling the physical world with BacNET attack framework

The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …

The cloud: Storms on the horizon

At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …

Don't miss

Cybersecurity news