+

Tagged With / 'cyber security'

August 23, 2013

Magazine News admin Comments Off
Hakin9_07_2013-1

Get Expert Skills on QR Code Hacking with Hakin9 Tutorials

Dear Readers, We are pleased to welcome you at the end of the summer period with a brand new issue. The issue that is supposed to be just a start in the area of QR code research. This is still a new topic and many people wouldn’t like to share their research and discoveries on […]

Read more

August 6, 2013

Events News NOTICE BOARD admin Comments Off
ciso_summit_logo800px (3)

CISO Summit 2013

The CISO Summit, December 3-4, 2013, in Scottsdale, Ariz., is the premier stage for C-suite decision-makers to share insight on information security issues, while gaining access to cutting-edge solutions tailored to their individual challenges. This exclusive summit admits a finite selection of leading executives and vendors, employing a strategic agenda that balances relationship-building, thought leadership […]

Read more

June 28, 2013

Magazine News admin Comments Off
Hakin9 On Demand Magazine 04/2013

Learn How To Perform Advanced Web Attacks And Exploitation With More Than 70 Pages Of Hakin9 Tutorials

Dear Readers, This month we follow exploitation topic, but with this very new issue you will get a huge load of advanced knowledge. Especially for you, the highest class experts prepared 12 step by step tutorials, which will turn you into masteres of advanced web attacks and exploitation. This time your guides in diving into […]

Read more

June 5, 2013

Events News NOTICE BOARD admin Comments Off
ZebraCON-01

ZebraCon 2013

Zebracon is not your traditional conference filled with vendor-centric presentations. Zebracon is a forum for sharing of information about key issues that most effectively impact security risk management and compliance trends. The conference will be held at Berjaya Times Square Hotel, Kuala Lumpur from the 27th to 29th August 2013. Each topic is specially designed […]

Read more

February 13, 2013

Magazine News admin Comments Off
How to Brute-Force Drupal6 login pages? (DDoS, Backtrack 5 r3, Cyber Security, Metasploit) - abolutely for free!!!

How to Brute-Force Drupal6 login pages? (DDoS, Backtrack 5 r3, Cyber Security, Metasploit) – abolutely for free!!!

Dear Readers, This month’s issue supplies you with the articles that are yet to be published in the forthcoming magazines. We would like to draw your attention to the best quality content of these publications and grant you with a couple of articles representing all the topics covered in February. Hakin9 Extra with its Backtrack […]

Read more

January 20, 2012


Conference: 2nd Annual Cyber Security Summit, 11th – 12th April 2012, Prague, Czech Republic

Conference name: 2nd Annual Enterprise Cyber Security Summit From: 11.4.2012 To: 12.4.2012 Location: Prague, Czech Republic Venue: TBA Conference email: css@ebcg.biz Telephone: +421 2 3220 2200 Description (section events): Join the premium security event of the year! 15 top speakers and over 100 CISOs as delegates! Ask for an early bird now! 2nd Annual Enterprise Cyber […]

Read more

September 30, 2011


Amazon Kindle Fire Silk browser not so private

The Amazon Kindle Fire (launched 09/28/11) runs a browser called Silk but it also supports/runs software in Amazon’s cloud. The cloud (Amazon Web Services) will manage the browser performance i.e. loading web pages, rendering graphics and managing security (including web scripts) allowing the browser to improve performance and network connectivity. This dual performance management capability […]

Read more

September 19, 2011


Cyber Security: SCADA Systems

Event: Cyber Security: SCADA Systems A technical exploration of protecting SCADA, smart grid and real-time systems Date: 2 December 2011 Venue: IET London: Savoy Place www.theiet.org/scada Join us at our exciting Cyber Security: SCADA Systems seminar to explore the technical world of protecting SCADA, Smart Grid and Real Time Systems, plus demonstration workshops and a […]

Read more

August 17, 2011


Are We Ready For Digital Evidence?

Are we ready for digital evidence? It’s a question that we need to ask more often as crimes will inevitably include forensic evidence gathered from a computer or other digital device on a more consistent basis. Similarly, we still live in a world where we think the computer and what we do on it or […]

Read more

August 17, 2011

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is used in most cases related to computer crimes. New crime vectors are now implicating the […]

Read more

April 6, 2011

News admin Comments Off

South Korean websites hacked

Hackers have attacked around 40 South Korean government and private websites. Targets include websites at the presidential office, the foreign ministry, the national intelligence services and some major financial institutions, according to US reports. Government officials have warned of a substantial threat to the country’s computers, with the National Cyber Security Centre reporting signs of […]

Read more

December 1, 2010

Magazine admin Comments Off
Botnets, Malware, Spyware - Hakin9 11/2010

Botnets, Malware, Spyware – Hakin9 11/2010

The Spyware Within YouRajat KhareYes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. The Ear of SauronJohn AycockIn The Lord of the Rings, Sauron wiles away the time peering out […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa