Operation Full Circle
Published on Feb 27, 2014 Intel Security’s McAfee GM of Corporate Products & Worldwide CTO, Michael Fey, will present the findings…
Read More »Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
Published on Feb 27, 2014 Organizations worldwide spent approximately $46B on cyber security in 2013, but successful breaches increased 20% and…
Read More »The FBI and the Private Sector: Closing the Gap in Cyber Security
Published on Feb 27, 2014 Director Comey will discuss cyber threats to our national security. We have made great strides, but…
Read More »Lifetime Achievement Award
Published on Feb 26, 2014 F. Lynn McNulty Accepting on McNulty’s behalf: Peggy McNulty Lt. Col. Frederick “F.” Lynn McNulty was…
Read More »Excellence in Information Security Award
Published on Feb 26, 2014 Zurich Insurance Group Accepted on organization’s behalf: James Shira, Group CISO and Head of Technology Architecture,…
Read More »The Cryptographers’ Panel
Published on Feb 25, 2014 Paul Kocher, Ron Rivest, Adi Shamir, Whitfield Diffie, Brian LaMacchia Join the founders and leaders of…
Read More »Excellence in the Field of Public Policy Award
Published on Feb 25, 2014 Dr. Patrick Gallagher, Under Secretary of Commerce for Standards and Technology This year’s award winner is…
Read More »Excellence in the Field of Mathematics Award
Published on Feb 25, 2014 Prof. Bart Preneel, COSIC, University of Leuven This year’s recipient was selected amongst a list of…
Read More »Redefining Identity in the Age of Intelligence-Driven Security
Arthur W. Coviello Executive Chairman, RSA Identity lies at the heart of online security—determining what we are able to access…
Read More »The Next World War Will be Fought in Silicon Valley
Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are under attack, and we are not…
Read More »Conundrums in Cyberspace: Exploiting Security in the Name of, well, Security
Trust in technology has been badly undermined by public disclosures of widespread government surveillance programs. As the important public debate…
Read More »Why encryption can be a pain and how we’re fixing that
Encryption often seems not worth the trouble – performance impact on users is just too great for many businesses. But…
Read More »Cybercrime Convention by Prof. Marco Gercke
Hacking on its way to become a criminal act? Within the topic of international regulation attempts in the field of…
Read More »-
Security News
EC Council Website Hacked
នាវេលារសៀលថ្ងៃអាទិត្យនេះ វិបសាយ EC-Council (http://www.eccouncil.org) ត្រូវបានទទួលរងការវាយប្រហារ ពីសំណាក់អ្នកវាយលុកតាមប្រព័ន្ធអិនធឺណែត (hacker) ដោយ មានដាក់នូវរូបភាព បាស្ព័ររបស់លោក Edward Snowden ដែលជាសកម្មជនទំលាយព័ត៌មានចារកម្មរបស់អាមេរិក។ ខាងក្រោមនេះគឺជារូបភាពនៃវិបសាយដែលត្រូវបានវាយប្រហារ៖ សូមបញ្ជាក់ថា វិបសាយ EC Council គឺជារបស់ក្រុមហ៊ុនផ្តល់សេវាកម្មបណ្តុះបណ្តាលផ្នែកសន្តិសុខតាមបណ្តាញអ៊ិនធឺណែត មានដូចជា…
Read More » -
General
‘The Moon’ – Linksys Malware, Spreading from Router to Router
តើ Wireless Router មួយណាដែលអ្នកប្រើប្រាស់នៅផ្ទះ ឬកន្លែងធ្វើការរបស់អ្នក? បើសិនជា ប្រភេទ LinkSys Router នោះអ្នកប្រហែលជាស្ថិតនៅក្នុងភាពគ្រោះថ្នាក់ហើយ ដោយសារតែ មានមេរោគមួយថ្មី ដែលធ្វើការវាយប្រហារ firmware និងធ្វើការចំលងទៅកាន់បណ្តាញ។ អ្នកស្រាវជ្រាវផ្នែកសន្តិសុខឈ្មោះថា Johannes B. Ullrich មកពី…
Read More »