HITB2013AMS: DSLR Cameras Used by Journalists Can Be Hacked

HITB2013AMS: DSLR Cameras Used by Journalists Can Be Hacked

Canon cameras can be easily turned into a surveillance device

Incapsula Protects HITB Website During Amsterdam 2013 Conference

Incapsula Protects HITB Website During Amsterdam 2013 Conference

Many users will access the site these days and not everyone might have good intentions

Softpedia Exclusive Interview: Dhillon Kannabhiran, CEO and Founder of HITB

Softpedia Exclusive Interview: Dhillon Kannabhiran, CEO and Founder of HITB

Here's everything you need to know about the upcoming edition of the conference

Hack in the Box Launches Twitter Competition, Winner Gets $1337 and a VIP Ticket

Hack in the Box Launches Twitter Competition, Winner Gets $1337 and a VIP Ticket

Here are the rules and the details of the contest

Laptop Docks Can Be Used for Hardware-Based Cyberattacks, Expert Says

Laptop Docks Can Be Used for Hardware-Based Cyberattacks, Expert Says

Andy Davis of NCC Group will present his findings at Black Hat Europe

Cast Your Votes for the 5th Edition of Social Security Blogger Awards

Cast Your Votes for the 5th Edition of Social Security Blogger Awards

Voting is open between January 21 and January 25

Preview of the DEFCON Documentary – Video

Preview of the DEFCON Documentary – Video

A 20-minute clip of Jason Scott's film has been made available

Softpedia Exclusive Interview: Andrei Avădănei, Founder of DefCamp

Softpedia Exclusive Interview: Andrei Avădănei, Founder of DefCamp

An interesting chat with the CEO of Romania's most important security conference

Computer Scientists Lost Their Innocence in 2009 After Stuxnet Incident – Video

Computer Scientists Lost Their Innocence in 2009 After Stuxnet Incident – Video

Mikko Hypponen held a great talk on cyberwar at Wired 2012

DefCamp 2012 Bucharest Overview – Video

DefCamp 2012 Bucharest Overview – Video

All about this edition of Romania's most important cyber security event

DefCamp 2012: Bypassing Security Tokens for Exploitation of Rounding Vulnerabilities

DefCamp 2012: Bypassing Security Tokens for Exploitation of Rounding Vulnerabilities

Presentation of a clever device developed by Adrian Furtuna

Third Edition of the DefCamp Security Conference to Take Place in Bucharest

Third Edition of the DefCamp Security Conference to Take Place in Bucharest

Information security enthusiasts are expected to attend the 3-day event

Post-Event Review of Hack in the Box 2012 Kuala Lumpur

Post-Event Review of Hack in the Box 2012 Kuala Lumpur

Prizes, interesting presentations and mind-challenging workshops

Mikko Hypponen’s Ponytail Auctioned for Charity at HITB2012KUL [Video]

Mikko Hypponen’s Ponytail Auctioned for Charity at HITB2012KUL [Video]

The money will go to cancer patients from Mount Miriam Cancer Hospital in Penang, Malaysia

Expert Reveals the Things That Allow Hackers to “Pwn” Websites [Video]

Expert Reveals the Things That Allow Hackers to “Pwn” Websites [Video]

Troy Hunt's complete presentation at the Developer Developer Developer! conference

Researchers Use McAfee and Trust Guard Trustmarks to Find Vulnerable Sites [Video]

Researchers Use McAfee and Trust Guard Trustmarks to Find Vulnerable Sites [Video]

A simple tool can show attackers what websites they should target

Hacker Collectibles to Be Auctioned at HITB2012KUL, Funds Raised for Cancer Patients

Hacker Collectibles to Be Auctioned at HITB2012KUL, Funds Raised for Cancer Patients

A customized Xbox 360, autographed Apple products and other cool items will be offered

 
Want more? Browse: