+

Tagged With / 'event'

January 20, 2012


Conference: 2nd Annual Cyber Security Summit, 11th – 12th April 2012, Prague, Czech Republic

Conference name: 2nd Annual Enterprise Cyber Security Summit From: 11.4.2012 To: 12.4.2012 Location: Prague, Czech Republic Venue: TBA Conference email: css@ebcg.biz Telephone: +421 2 3220 2200 Description (section events): Join the premium security event of the year! 15 top speakers and over 100 CISOs as delegates! Ask for an early bird now! 2nd Annual Enterprise Cyber […]

Read more

December 7, 2011

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

December 5, 2011


Skype flaw can track users’ location and P2P activity

Security researchers have found a security flaw in Skype. The flaw found several properties of Skype that can track not only a users’ locations over time, but also their P2P file activity. The researchers also found that “even when a user blocks callers or connects from behind a Network Address Translation (NAT), it does not […]

Read more

November 16, 2011


ISSE 2011 – 22-23 November, Prague

This year’s Information Security Solutions Europe (ISSE) conference will be held in Prague on 22-23rd  November. ISSE is the only independent, interdisciplinary security conference in Europe. World-leading industry experts will speak about a number of most actual topics in IT security. The topics include: cloud computing; mobile and wireless security; security management; identity and access […]

Read more

November 14, 2011

Hakin9 Extra Rootkit

Hakin9 Extra – Rootkit 06/2011

Rootkits Hidden in Hardware of PC by Anibal Sacco Let’s think like an attacker for a second. There are multiple applications dedicated to find malicious code both in user and in kernel space. So new places have to be found to deploy your code while keeping it stealthy. TDSS aka TDL – Chronology by Eugene […]

Read more

November 10, 2011

pic

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 24, 2011

Exploiting Software 02/11 - Exploit Format Strings with Python

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more

October 20, 2011


Four million people victims of identity fraud in the UK

It’s National Identity Fraud Prevention Week this week in the UK. As part of Julian’s identity fraud awareness push he’d like just go over some old ground. Fellowes a paper-shredding supplier commissioned a report which highlighted that 7 per cent of the UK population (4 million people) have been a victim of identity fraud at […]

Read more

October 6, 2011


Application Security Forum – Western Switzerland conference, October 2011

The city of Yverdon-les-Bains will host by end of October the 2011 edition of the Application Security Forum – Western Switzerland conference. For this second edition, an exceptional lineup consisting of: 19 speakers and trainers, both locally and internationally recognized, will share their knowledge, best practices and experience on all sensitive topics  related to application […]

Read more

October 3, 2011


InfoSecurity Europe 2012

Infosecurity Europe 2012 24 – 26 April 2012 Infosecurity Europe is Europe’s no.1 information security event, providing the perfect platform to showcase the latest product and service solutions to the entire information security industry. Infosecurity Europe is the only European event that enables industry professionals to gather vital information about the latest trends and developments […]

Read more

September 25, 2011

9781439801505

Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa