Podcasts
  • A new defense against kernel-mode exploits

    Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.

  • The state of GRX security

    Late last year, documents from Edward Snowden's NSA trove have revealed that Britain's GCHQ has mounted a successful attack against Belgacom (the largest telecom in Belgium) and its subsidiary BICS (Belgacom International Carrier Services), a Global Roaming Exchange (GRX) provider. Other GRXs have been targeted as well.

    But how easy is it to breach the systems of existing GRX providers? Stephen Kho and Rob Kuiters, penetration tester and incident response handler (respectively) in the CISO team of the Netherland’s largest telecoms provider KPN, have decided to check.

  • Replicating NSA's gadgets using open source

    In this podcast, wireless security researcher Michael Ossmann shares his insights on what to use - and how - to duplicate hardware devices found in the ANT catalog.

  • Defeating UEFI's SecureBoot

    The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. But is it secure enough? Or, at least, more resilient than BIOS?

    Corey Kallenberg, Security Researcher for the MITRE Corporation, and his colleagues Sam Cornwell, Xeno Kovah and John Butterworth have been testing ways to bypass UEFI's SecureBoot - a new feature that enforces a signature check on the boot loader before the firmware transfers control to it.

  • Improving training programs in cyber security

    In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity education.



Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //