April 09, 2012
Chris Wysopal discusses why it is so important to the power grid to write secure code for software, how computer intrusion methods have changed in over past two decades, the impact of data breaches on modern organizations, and the necessity for thorough testing prior to launch...
April 07, 2012
At Black Hat Europe, we had a chance to catch up with Phil Polstra to give us the low down on his pet USB projects and an interesting speaker timer on the side. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
April 05, 2012
A lot of people who are new in the field of infosec ask how they can learn and develop their skills more. So, to answer this common question, I present my favourite free (or inexpensive) ways that you can learn more. Including mentoring. What else do you need?
April 04, 2012
We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
March 30, 2012
"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."
March 24, 2012
Whilst at Black Hat Europe 2012, I realized that this was the first big conference many had attended, so thought it would be useful for others to create this short guide on how to survive black hat - courtesy of Infosec Island and NETpeas...
March 23, 2012
We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”
March 05, 2012
Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...
March 03, 2012
According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...
March 02, 2012
Rafal Los is the Chief Security Evangelist for HP Software and took a few minutes to discuss challenges associated with Enterprise Network Security. He works with customers, the industry, and the community on effectively bringing business and technology together securely...
February 29, 2012
Roger Thornton, CTO at AlienVault, discusses the need for organizations to reduce the overall cost of network security visibility. He believes that technology is not the problem, but instead it is the time, money and staff needed for effective and meaningful visibility...
February 29, 2012
David Barroso and Jaime Blasco discuss the AlienVault Open Threat Exchange (AV-OTX) - a system for sharing intelligence among OSSIM users where an attack on any member alerts and arms the others with the timely intelligence required to manage a similar event...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015