Read more about Black Hat
Bookmark and Share
  • Don't get pwned at Black Hat, DEF CON

    29.07.2013

    I am not a paranoid person and most industry conferences I go to don’t generate any worries about security.

  • A historical overview of the cyberattack landscape

    25.07.2013

    Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially.

  • Major vulnerabilities in office security and RFID systems

    19.07.2013

    At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and RFID‑based badging systems.

  • Researcher sets up honeypot to counterattack, identifies attackers

    27.03.2013

    I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack by hackers.

  • Can the Nuclear exploit kit dethrone Blackhole?

    31.10.2012

    In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the developer of a fourth one hope to compete? The Nuclear exploit pack has been present for a while now, and its author has recently released version 2.0.




Spotlight

Dissecting the unpredictable DDoS landscape

Posted on 23 April 2014.  |  DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage, according to Neustar.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Apr 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //