Name That Toon: Knives Out
May 16 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreJust one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.
Read moreIn a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
Read moreA decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
Read moreA decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
Read moreIn a Black Hat Asia keynote Fireside Chat, US National Cyber Director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
Read moreThis is a current list of where and when I am scheduled to speak:
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
Read moreThe Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
Read more
Recent Comments