Security in a hyperconnected world
In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …
Wolfgang Kandek presents new Qualys offerings
During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …
Video: RSA Conference 2013 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2013. Here’s a closer look at the show. For …
OAuth flaw allowed researcher full access to any Facebook account
A flaw in Facebook’s OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain …
Video: Pirate Party MEP talks online child safety
Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …
EU cybercop: European Cybercrime Centre to focus on criminal gangs
The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …
Information security: Understanding a global picture in a local context
“Think globally, act locally” is a phrase now cliche because it expresses an incontrovertible and immediately graspable truth. The global/local concept applies …
Hackers the movie: A retrospective
In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective from Hack in The Box 2012, …
Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
Video: History of the JavaScript security arsenal
In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw …
Video: Data mining a mountain of vulnerabilities
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …
Video: Hacking Huawei VRP
Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …