The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
Although Chrome wasn't attacked directly at the contest, Google has released an update for the Windows, Linux and Mac OS X versions of its browser. The update closes a hole in WebKit that was originally exploited in Blackberry devices
The second day of the Pwn2Own competition, organised by the Zero Day Initiative (ZDI) team at security researchers TippingPoint, was devoted to iPhone and BlackBerry. Charlie Miller exploited a vulnerability in the mobile version of the Safari web browser on iOS 4.2.1 to delete the address book when a manipulative website was visited.
When the Pwn2Own contest began in 2007, it was dismissed by some in the industry as nothing more than a publicity stunt meant to inflate the egos of researchers while embarrassing software vendors. But as the fifth edition of the hacker challenge gets underway at the CanSecWest conference here this week, it has evolved into a display of some of the few things that are actually good and right with the security community.
Google's $20,000 was as safe at Pwn2Own Wednesday as if it had been in the bank. The search giant had promised to pay $20,000 to the first researcher who broke into Chrome on the hacking contest's opening day.
The annual Pwn2Own hacking challenge kicks off today, pitting security researchers against web browsers and mobile platforms. The HP TippingPoint sponsored event grows every year to include more platforms, though Linux isn't among them.
The Pwn2Own hacking contest next month will feature its largest-ever crew of contestants, including past winners, a French security firm armed with a bagful of bugs and an iPhone jailbreak expert who has been sued by Sony.
There are more than 450 expo vendors showing wares or hawking programs at the 20th annual RSA Conference now underway in San Francisco. In the weeks leading up to the conference talked with nearly 25 vendors about the announcements they are making today.
A major topic sure to be discussed at RSA Conference 2011 next week is cyber warfare -- specifically, whether or not we're really in the middle of one. Fueling the debate is Stuxnet, a piece of malware widely believed to be the creation of Israel and-or the U.S., designed to attack Iranian nuclear facilities.
The annual RSA Conference, now in its 20th year, will be rocking this month as the security industry gathers in the weeklong extravaganza of product introductions and security experts arguing cloud and mobile computing security issues.
Smartphone security has been a major focus at ShmooCon in the last couple years, with talks about flaws in BlackBerry and iPhone devices. This year, two researchers targeted all their firepower on the Android. Here's what they found.
A Black Hat Conference is nothing if not quirky as security geeks try every stunt possible to show what a clueless world we live in when it comes to security. Anyway, here are some such moments from this week's event:
Theo de Raadt is one of the key hackers outside the mainstream GNU/Linux world. Here's his self-penned bio: I am the founder of OpenBSD -- a freely redistributable 4.4BSD-based operating system with an emphasis on security. Donations allow me to put my efforts into OpenBSD and related projects. In 1999, I created OpenSSH with other members of OpenBSD.
Comodo offers tips to experience e-commerce a safe and secure one this season. Never, under any circumstances, use a public network for financial transactions. Public networks include Internet cafes, coffee houses, public libraries and airports. Only send your personal and financial details over a network you've set up yourself, or one you know to be secure. Who knows what horrors are lurking on the hard disk of that internet.
Understanding the business risk posed due to security threats is crucial for IT managers and security officers, two analysts have claimed. Addressing a media roundtable in Sydney at the Gartner Symposium, Andrew Walls and Rob McMillan said CIOs and CSOs must be abreast of their organisations
What if you could outfit visitors to your website with a coat of anti-botnet armor? A pair of researchers has come up with coding techniques they say ultimately renders infected user machines useless to botnet operators harvesting data.
Software security house Imperva will release details of its 10 key security trends for 2011 next week. Here is a preview.
Man in the browser (MITB) attacks are a new threat which consumers will face and the hacking industry is widely adopting, especially as many security products are not mature enough yet to deal with this problem.
With the CIA, NSA and Homeland Security looking over their shoulders, computer hacking teens from an Aurora high school placed 12th among 120 teams in a national competition.