HITB2012KUL: 10 Teams from Asia to Compete in CTF for “Leet” Prizes

HITB2012KUL: 10 Teams from Asia to Compete in CTF for “Leet” Prizes

This year's event is dubbed Fallout Apocalypse and it focuses on nuclear facilities

HITB2012KUL Agenda: John Draper, Mikko Hypponen, Charlie Miller and Many Others

HITB2012KUL Agenda: John Draper, Mikko Hypponen, Charlie Miller and Many Others

Some of the security experts who will take center stage at the conference in Kuala Lumpur

HITB2012KUL: Hack in the Box Celebrates Its 10-Year Anniversary

HITB2012KUL: Hack in the Box Celebrates Its 10-Year Anniversary

Here are some of the highlights of the conference set to take place on October 8-11

  • Security
  • By Eduard Kovacs
  • September 27th, 2012
DDOS Attacks Take the Day Off During Holidays, Study Shows

DDOS Attacks Take the Day Off During Holidays, Study Shows

The number of cyberattacks recorded a considerable drop on Earth Day

Stonesoft to Host First Cyber Security Summit on October 24, 2012

Stonesoft to Host First Cyber Security Summit on October 24, 2012

Participants can learn everything they need to know about protecting their networks

Security Expert “Hacks” Handcuffs Using 3D Printer

Security Expert “Hacks” Handcuffs Using 3D Printer

A German researcher shows everything there is to know about handcuff security

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

Charlie Miller will present his findings at Black Hat USA 2012

Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Stochastic forensics can be used to determine if data was copied from a computer

Jailbreak Dream Team Press Conference at HITB 2012 Amsterdam (Video)

Jailbreak Dream Team Press Conference at HITB 2012 Amsterdam (Video)

The hackers answer questions from representatives of the media

Bruce Schneier on Trust, Security and Society at HITB 2012 Amsterdam

Bruce Schneier on Trust, Security and Society at HITB 2012 Amsterdam

The security guru presents his latest book called "Liars and Outliers"

Hackers Reveal the Price of iOS Jailbreaks at HITB 2012 Amsterdam

Hackers Reveal the Price of iOS Jailbreaks at HITB 2012 Amsterdam

They provided the exact sum, but they claim they're not in it for the money

Hackers Ready iOS 6 Jailbreak Before Apple Even Rolls Out the Betas (Updated)

Hackers Ready iOS 6 Jailbreak Before Apple Even Rolls Out the Betas (Updated)

Take a look at some of the techniques they use to accomplish their task

Hack in the Box 2012 Amsterdam Video Overview

Hack in the Box 2012 Amsterdam Video Overview

Take a look at some of the key moments from day one of the event

Softpedia Exclusive Interview: Karim H.B., Vulnerability Lab Researcher

Softpedia Exclusive Interview: Karim H.B., Vulnerability Lab Researcher

One of the newest members of the team introduces himself after winning the MCSC

Social Engineering and Hacking Skills Put to the Test at HITB 2012 Amsterdam

Social Engineering and Hacking Skills Put to the Test at HITB 2012 Amsterdam

Sogeti Nederland B.V. sponsors "Social Engineering and CTF Challenge"

Softpedia Exclusive Interview: Viknesvaran Sittaramane, Security Expert, DEF-CON Organizer

Softpedia Exclusive Interview: Viknesvaran Sittaramane, Security Expert, DEF-CON Organizer

Learn all about the conferences and the activities of the NetNoble team

HITB 2012 Topics: WinRT and the “Ghost” in the Windows 7 Allocator

HITB 2012 Topics: WinRT and the “Ghost” in the Windows 7 Allocator

Experts demonstrate that every new feature can be exploited to cause damage

 
Want more? Browse: