Read more about conferences
Bookmark and Share
  • Why open source and collaboration are the future of security

    08.09.2014

    In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security innovation.

  • Malicious and risky apps on Android and iOS

    05.09.2014

    Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc.

  • Lessons learned from running 95 bug bounty programs

    03.09.2014

    Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and cost-prohibitive for most companies.

  • The economics of hacking

    28.08.2014

    In this podcast recorded at Black Hat USA 2014, Wade Williamson, Security Researcher at Shape Security, talks about the economics of hacking and how some of today's techniques are trying to invert it.

  • The synergy of hackers and tools at the Black Hat Arsenal

    27.08.2014

    Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts from the brightest in academia to world-class researchers and leaders in the public and private sectors.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //