Hardening Windows processes
Didier Stevens is an IT security consultant working for a large financial corporation in Belgium. In this video recorded at Hack in The Box 2012 Amsterdam, Didier talks about …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Security vulnerabilities of DVB chipsets
This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Monitoring the quality of SSL support
Ivan Ristic, Director of Engineering at Qualys, talks about SSL Pulse – a continuous and global dashboard for monitoring the quality of SSL support across the top one …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Investigating Android permissions
Georgia Weidman is the founder of Bulb Security. She’s also a penetration tester, security researcher, and trainer. In this video recorded at Hack in The Box 2012 …
Make your pentester work harder for his money
In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …
Gamers increasingly under attack
In this video, Christopher Boyd, Senior Threat Researcher at GFI Software, talks about how scammers increasingly target gamers and gaming databases because of valuable …
Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
Security and privacy in the AWS cloud
Security is the number one question that most C-Level executives ask about the cloud. In this video, Stephen E. Schmidt, General Manager and CISO, shares some of the details …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility