The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
Sophisticated hackers now use "social engineering" - exploiting the psychological vulnerabilities of human users - rather than technological weaknesses in security systems, famous former hacker Kevin Mitnick told a cyber security conference in Dubai.
The University of NSW is known for producing some of Australia's top lawyers, doctors and accountants. But the 64-year-old institution is now gaining a reputation for excelling in what is often viewed as anti-establishment
The HackMiami 2013 Hackers Conference, taking place on Miami Beach, will feature comprehensive training seminars that seek to facilitate the skills of SQL injection, smartphone attacks, and enterprise network breaches.
When it comes to education, most people agree, more is better. No one embodies that principle at least in regard to IT certifications better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber Security Task Force, Irvine holds more than 20 IT certifications, of which at least six are specifically information security-oriented.
Researchers from MWR Labs find a way to exploit a Chrome vulnerability, sidestep Windows 7 safety measures, and do whatever they want on the operating system.
Over the past few years, the Pwn2Own hacker contest has become an important fixture in the world of testing the security of software applications, operating systems and hardware devices. This year, HP TippingPoint, a sponsor of Pwn2Own, made clear that it was expanding the focus of the competition beyond browsers.
Hackers are consistently breaching enterprise's systems by going after the end user through the use of things like phishing attacks. Even as security technologies are getting smarter hackers are going after the one thing that hasn't improved: The end users' security knowledge.
Research teams Wednesday cracked Microsoft's Internet Explorer 10 (IE10), Google's Chrome and Mozilla's Firefox at the Pwn2Own hacking contest, pulling in more than $250,000 in prizes.
It was August 2011, and a lone Public Safety Canada cyber-security official wanted to take a trip to Las Vegas to meet with the experts on cracking into government systems: hackers.
At Hack In The Box researcher Felix "FX" Lindner has shown how Huawei routers are easy to access with their static passwords and how one machine could give an attacker access to an entire network.
Hack in the Box will host its 10th security conference this week in Kuala Lumpur featuring an all-star cast of hacking luminaries and a cutting-edge program.
The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam on Wednesday.
The demonstration of a real-world hardware security flaw in hotel room keycard locks at this year's Black Hat information security conference in Las Vegas saw guests literally reaching for their deadbolts.
2600 magazine's Emmanuel Goldstein sez, "The theme of the 2013 Hacker Calendar is surveillance, and there are 12x12 glossy photos for every month of our surveillance culture hard at work - airport security, the NSA, Menwith Hill, automobile monitoring, even cameras in trees. The cover photo depicts one of society's older surveillance tools: the peephole. In addition, nearly every day of the year is marked with some event or milestone of interest to the hacker community."
ToorCamp is an American-flavored hacker camp that was inspired by European versions like CCC Camp in Germany and HAR Camp in the Netherlands. ToorCamp 2009 was the "first ever full-scale" USA hacker camp and was held inside an abandoned Titan-1 Missile silo at Moses Lake, WA.
The government- and Sophos-sponsored challenge is designed to drum up interest in learning Linux security skills, which are needed for protecting web infrastructure and, in turn, companies