Videos Tagged with "hackers"

68b48711426f3b082ab24e5746a66b36

Video: Do I Have to Secure All My Applications?

September 24, 2012

Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

BlackHat 2012: Dwayne Melancon Key Takeaways

August 13, 2012

Melancon notes a key finding that “Hackers are always looking for outliers…and the key is to have a way to evaluate your systems and security posture continuously and be able to react pretty quickly.” What else can businesses learn from hackers? Check out this video to find out...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

When to Strike Back: Mitigative and Retributive Counterstriking

August 10, 2012

Our information and cyber security perimeters and infrastructures are battered daily by scores of probes, scans, and attacks. We stand in defensive posture ducking, bobbing and weaving as we try to avoid the offensive onslaught. It is a losing proposition. Isn't it time we started striking back?

Comments  (0)

68b48711426f3b082ab24e5746a66b36

What is Cross-Site Scripting?

July 19, 2012

In a XSS attack, JavaScript might steal session credentials, capture keystrokes or iterate across every form on a page and replace every action so that instead of submitting your username and password to the real application, the JavaScript causes your username and password to be sent to the attacker...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Securing Enterprise Communications Systems and Applications

April 27, 2012

Javvad Malik caught up with Rahul Sasi at Black Hat Europe 2012 to learn about securing automated enterprise communications systems and applications against sophisticated hacking attack techniques. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Hacking Tools and Ethics

April 20, 2012

Joshua Corman wrote a post in which he raises some valid points about tools like Metasploit. Naturally, the purpose such tools is to aid a security tester in finding vulnerabilities. However you cannot dictate if someone will use this for attack or defensive purposes...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Rafal Los at Black Hat EU 2012

April 12, 2012

We were fortunate to get an interview with HP's Global Software Security Evangelist Rafal Los at Black Hat Europe where he speaks about threat modeling and how we can stop determined attackers. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Video: FBI's Top Cyber Official Discusses Threats

March 30, 2012

"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Video: Anonymous Claims Hack of FBI Conference Call

February 03, 2012

"The conversation covers tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police. Anonymous also published an email from the FBI, showing the email addresses of call participants. The FBI confirmed the intercept..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

850c7a8a30fa40cf01a9db756b49155a

Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat's Technical Director Travis Carelock

August 03, 2011

Travis Carelock is the Technical Director for the Black Hat USA 2011 Conference, taking place this year in Las Vegas, Nevada. Travis talks about some of the technical challenges his team ran into this year, including a fire alarm during the first keynote address by Cofer Black...

Comments  (0)


Most Liked