Video
Wireless LAN Security Mega-Primer Part 3: Pwning Beacon Frames
In Part 3, we will understand the basics of Beacon frames and how access points use it to advertise their…
Read More »Wireless LAN Security Mega-Primer Part 2: Bands, Channels and Sniffing
Description: In Part 2, we will learn how to setup our wireless card into monitor mode and start sniffing the…
Read More »How Do You Start Your Career in Cybersecurity?
The third of a three-part series titled “How to Get Hired in Cyber: Making the Cut at ManTech.’ Defense contractor…
Read More »Wireless LAN Security Mega Primer Part I: Getting Starts
Description: Welcome to the Wireless LAN Security Megaprimer! In this video series, we will understand the basics of wireless LAN, security…
Read More »How botnet “command-and-control” works
Botnet command and control centers come in many different forms – here’s a breakdown of how it works and how…
Read More »An Interview with Vicente Diaz, Kaspersky Lab at Mobile World Congress
Published on Feb 27, 2014 Vicente Diaz of the Global Research and Analysis Team (GReAT) spoke with Kaspersky Daily to discuss…
Read More »These IT Companies Are Making Life Too Easy For Hackers
Published on Jan 7, 2013 A Gift for the Hackers – Netherlands: IT companies are failing to secure devices connected to…
Read More »Little Bets: How Breakthrough Ideas Emerge from Small Discoveries
Published on Mar 1, 2014 Sims demonstrates that the linear problem-solving we were conditioned to embrace, actively thwarts creativity. Rather, through…
Read More »Hugh Thompson and Guests
Published on Mar 1, 2014 Security guru and bestselling author Dr. Herbert “Hugh” Thompson has seen it all—hacked voting machines, exposed…
Read More »RSA 2014 Keynote – Scott Harrison, Charity : water
Published on Feb 28, 2014 Seven years ago Scott Harrison started charity: water with a mission to bring clean drinking water…
Read More »State of the Hack: One Year after the APT1 Report
Published on Feb 25, 2014 Nawaf Bitar Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are…
Read More »RSA 2014 Keynote – Philippe Courtot, Qualys
Published on Feb 28, 2014 Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However,…
Read More »The New Model of Security
Published on Feb 28, 2014 The pace of change in technology is accelerating and security is no different, with attackers innovating…
Read More »The Future of Security
Published on Feb 27, 2014 How do you stop a motivated attacker who has unlimited resources from compromising your enterprise’s most…
Read More »