Read more about Black Hat
Bookmark and Share
  • Don't get pwned at Black Hat, DEF CON

    29.07.2013

    I am not a paranoid person and most industry conferences I go to don’t generate any worries about security.

  • A historical overview of the cyberattack landscape

    25.07.2013

    Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially.

  • Major vulnerabilities in office security and RFID systems

    19.07.2013

    At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and RFID‑based badging systems.

  • Researcher sets up honeypot to counterattack, identifies attackers

    27.03.2013

    I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack by hackers.

  • Can the Nuclear exploit kit dethrone Blackhole?

    31.10.2012

    In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the developer of a fourth one hope to compete? The Nuclear exploit pack has been present for a while now, and its author has recently released version 2.0.




Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //