Read more about HITBSecConf
Bookmark and Share
  • Mobile SSL failures: More common than they should be

    13.07.2015

    Securing your mobile application traffic is apparently more difficult than it should be, as researchers Anthony Trummer and Tushar Dalvi discovered when looking into SSL/TLS usage on the Android operating system and applications, as well as on iOS and Windows 8 mobile.

  • Rethinking security: Securing activities instead of computers

    15.06.2015

    For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) and effective patching - in short, to low-level security.

  • How to develop effective honeypots

    11.06.2015

    Honeypots - decoy systems used for learning cyber attackers' capabilities and potential objectives - can be very useful to organizations, businesses, and individuals.

  • IoT is full of gaping security holes, says Shodan creator

    09.06.2015

    John Matherly's Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts (e.g.

  • Discovering connections between attackers

    04.06.2015

    In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.




Spotlight

Check out the Windows 10 security features

The release of Windows 10 brings a number of security upgrades that look good on paper, but as with all new products to market, it is advisable that organisations carefully plan any upgrades.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Jul 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //