• Rudra: Framework for automated inspection of network capture files

    In this podcast recorded at Black Hat USA 2015, Ankur Tyagi, Malware Research Engineer at Qualys, talks about Rudra, a framework for automated inspection of network capture files. It extends upon another tool called flow inspect and adds subsequent file-format aware analytics to its feature set.

  • How data breaches are changing information security

    In this podcast recorded at Black Hat USA 2015, Gautam Aggarwal, Chief Marketing Officer at Bay Dynamics, takes a look at the past year in the security space and the important events that have shaped the industry.

    He discusses APTs, visibility, accountability, the ramifications of high profile data breaches, as well as the way boards are getting involved in information security issues.

  • Open source auditing with Lynis

    Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their Linux/Unix based systems. It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

    In this podcast recorded at the Black Hat USA 2015 Arsenal, Michael Boelen, the creator of Lynis, talks about how his tool is flexible and easy to use. It is one of the few tools, in which installation is optional. Just copy it onto the system and give it a command like "audit system" to run the security scan. It is written in shell script and released as open source software.

  • Threat intelligence monitoring and management

    LookingGlass is the world leader in cyber threat intelligence management. They collect and process all source intelligence, connecting organizations to valuable information through their cyber threat intelligence monitoring and management platform.

    In this podcast recorded at Black Hat USA 2015, A.J. Shipley, Vice President, Product Management at LookingGlass, talks about the company's product line and introduces ScoutVision, ScoutInterXect, Virus Tracker, CloudShield, DNS Defender, and Trusted Cyber Solution Orchestrator.

  • Cloud security without borders

    The cloud's growing prevalence is drastically changing the way we do business and conduct our daily lives. As the digital exchange of business and personal information increases, data security and privacy have become an acute problem that we must address.

    In this podcast recorded at Black Hat USA 2015, Philippe Courtot, Chairman and CEO at Qualys, illustrates the mind shift we must make to better address these challenges and highlights new approaches for ensuring data security and privacy.


MagSpoof: A device that spoofs credit cards, disables chip-and-PIN protection

The device can wirelessly spoof credit cards/magstripes, disable chip-and-PIN protection, and predict the credit card number and expiration date of Amex cards after they have reported stolen or lost.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Nov 26th