Read more about conferences
Bookmark and Share
  • Malicious and risky apps on Android and iOS

    05.09.2014

    Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc.

  • Lessons learned from running 95 bug bounty programs

    03.09.2014

    Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and cost-prohibitive for most companies.

  • The economics of hacking

    28.08.2014

    In this podcast recorded at Black Hat USA 2014, Wade Williamson, Security Researcher at Shape Security, talks about the economics of hacking and how some of today's techniques are trying to invert it.

  • The synergy of hackers and tools at the Black Hat Arsenal

    27.08.2014

    Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts from the brightest in academia to world-class researchers and leaders in the public and private sectors.

  • Point of Sale system architecture and security

    27.08.2014

    To most people, Point of Sale (POS) systems with integrated payment processing are a black box where magic happens.




Spotlight

The Software Assurance Marketplace: A response to a challenging problem

Posted on 20 October 2014.  |  The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //