Applied Security Briefing lineup for this December event also includes expert looks at Google’s ClusterFuzz and the art of breaking PDF encryption. The organizers of Black Hat Europe have...
Read moreApplied Security Briefing lineup for this December event also includes expert looks at Google’s ClusterFuzz and the art of breaking PDF encryption. The organizers of Black Hat Europe have...
Read moreSOC Puppet: Dark Reading Caption Contest Winners
October 20 2019Social engineering, SOC analysts, and Sock puns. And the winners are: First Prize ( $25 Amazon gift card) goes to Deadsnott, aka John-Paul Power, whose day job is information developer at...
Read moreSOC Puppet: Dark Reading Caption Contest Winners
October 20 2019Social engineering, SOC analysts, and Sock puns. And the winners are: First Prize ( $25 Amazon gift card) goes to Deadsnott, aka John-Paul Power, whose day job is information developer at...
Read moreGlitching: The Hardware Attack that can Disrupt Secure Software
October 19 2019Glitching (or fault-injection) attacks aren’t easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of...
Read moreGlitching: The Hardware Attack that can Disrupt Secure Software
October 19 2019Glitching (or fault-injection) attacks aren’t easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of...
Read moreIn A Crowded Endpoint Security Market, Consolidation Is Underway
October 19 2019Experts examine the drivers pushing today’s endpoint security market to consolidate as its many players compete to meet organizations’ changing demands and transition to the cloud. The overcrowded endpoint...
Read moreIn A Crowded Endpoint Security Market, Consolidation Is Underway
October 19 2019Experts examine the drivers pushing today’s endpoint security market to consolidate as its many players compete to meet organizations’ changing demands and transition to the cloud. The overcrowded endpoint...
Read moreTor Weaponized to Steal Bitcoin
October 19 2019A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser. Criminals are using the Tor browser — long a favorite of privacy-conscious...
Read more
Recent Comments