Read more about HITBSecConf
Bookmark and Share
  • Mobile SSL failures: More common than they should be

    13.07.2015

    Securing your mobile application traffic is apparently more difficult than it should be, as researchers Anthony Trummer and Tushar Dalvi discovered when looking into SSL/TLS usage on the Android operating system and applications, as well as on iOS and Windows 8 mobile.

  • Rethinking security: Securing activities instead of computers

    15.06.2015

    For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) and effective patching - in short, to low-level security.

  • How to develop effective honeypots

    11.06.2015

    Honeypots - decoy systems used for learning cyber attackers' capabilities and potential objectives - can be very useful to organizations, businesses, and individuals.

  • IoT is full of gaping security holes, says Shodan creator

    09.06.2015

    John Matherly's Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts (e.g.

  • Discovering connections between attackers

    04.06.2015

    In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.




Spotlight

Why collaboration is crucial in the battle for IT security

Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Sep 2nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //