The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
The fundamental failure of endpoint security
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
Brain: Searching for the first PC virus in Pakistan
Here is a 10-minute video reportage about Mikko Hypponen’s trip to Lahore, Pakistan, to find the authors of the first PC virus “Brain”. This is the first …
Securing the enterprise: Insight from Qualys
In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company: Next …
Video: Light painting Wi-Fi
This project explores the invisible terrain of Wi-Fi networks in urban spaces by light painting signal strength in long-exposure photographs. A four meter long measuring rod …
Video: RSA Conference 2011 showcase
In this RSA Conference 2011 video showcase, you can check out the look and feel of the event and the expo floor. The companies featured in the video are Qualys, Secunia, …
Injection attacks tutorial
This episode of the OWASP appsec tutorial series describes the #1 attack on the OWASP top 10 – injection attacks. The video illustrates SQL injection, discusses other …
USB autorun attacks against Linux
Many people think that Linux is immune to the type of Autorun attacks that have plagued Windows systems with malware over the years. However, there have been many advances in …
Hacker recovers stolen computer and gets criminal caught
In this video recorded at DEFCON, a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught. Although the story is quite …
Bruce Schneier on cyberwar and cybercrime
In this video, Bruce Schneier examined the future of cyberwar and cyber security. He explored the current debate on the threat of cyber war, asking whether or not the threat …
Security, privacy and the generation gap
In the video below, Bruce Schneier talks about social networking sites and the future of privacy at the HEAnet National Networking Conference 2010 in Ireland.
Video: Physical penetration testing
In this video, Keith Pachulski and Brian Martin from Digital Trust discuss physical penetration testing and physical security assessments.
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility