News

News (2850)

DEF CON 22, Las Vegas, NV - The thought of getting a root kit or back door on a critical system is always a bad one. These pieces of malicious code allow an attacker to continue to exploit your network…
Friday, 08 August 2014 14:18

How do we save the internet?

Written by
DEF CON 22, Las Vegas, NV Aug 2014 – One of the most concerning things about the future of the internet and technology in general is the fact that the “bad guys” have the advantage. We have known about this…
The Flash Memory Summit wound down on Thursday after a four day run at the Santa Clara Convention Center in San Jose. The show floor was fairly crowded with over 5,000 attendees and a sold out exhibition space.
Black Hat 2014, Las Vegas, NV - If you have ever had to build a network or add in a new service then you know the joys that can bring to your life. Not only do you have to plan…
Black Hat 2014 Las Vegas, NV - The thought of a network breach or targeted attack is what keeps most systems admins up at night and constantly irritated to boot. The need to man the walls and make sure the…
Black Hat 2014 Las Vegas, NV – Today we had the chance to talk with Karl Sigler, Threat Intelligence Manager at Trustwave who walked us through the latest version of Backoff. For those of you that do not know Backoff…
One of the biggest issues in security is not the number of bad guys out there or the number of zero day exploits that exist in the wild. Sadly it is that far too many companies and people do not…
Security should be a priority in any company, but it should be even more paramount in places where lives are at risk. So we have to wonder how someone ever allowed a security flaw in aircraft inflight systems that would…
One thing I find interesting is the lack of any real memory in the technical press. It seems that the people that write about trends and events happening in the technical world often do not remember what has happened before.…
The world is connected now, there is simply no getting around it. We have a multitude of devices that are now connected to the internet. I am not talking about security systems or cameras, I am talking about our TVs,…
In the late-90s the world was shocked when a single collection of code was able to destroy a number of computers through malicious instructions. Named Chernobyl (or CIH and Spacefilter) this virus was able to overwrite data and even the…
Following on the heels of the removal of a talk about unmasking users of the TOR network we are now hearing that someone has been attacking the anonymity service for the last 5-6 months in an attempt to ind out…
Hey, remember that very upbeat and positive message that Crytek put out about securing their financial future? Well let’s just say that the happy smiles and positive tone that were in the message might have been hiding some not so…
Every now and then you see a game developer/publisher really push the limits when it comes to the goodies they are willing to pack into a game. We have seen everything from personal drones to night vision goggles in some…
There is a perception that to enjoy brilliant tablet gaming you have to pay big bucks – but that is not the case. There are tablets at every price that can give you this; you just need to find the…
It is always a bad day when you find out there is a problem. Even if it is as simple as your coffee pot not working (ok bad choice for many). Things are made worse when you find out it…
Page 19 of 179