The Latest in IT Security

Posts Tagged ‘Black Hat’

July and August – summer in the Northern Hemisphere, especially in Nevada and California – often produce some interesting and unusual computer security research. This is when the media-meets-hacker-in-Vegas two-ring circus of Black Hat and DEFCON (BH/D) takes place. It’s also when you can attend the academically-styled, but in many ways much groovier, USENIX Security […]

Read more ...

Bug bounty programs are designed to reward security researchers for finding flaws in a vendor’s product that have made it past their own quality processes. Some organizations, such as Google and Mozilla, have had bug bounty programs in place for a time, while social networking site Facebook just announced a bug bounty program with a […]

Read more ...

Most devices nowadays, like printers, scanners and VoIP systems, have embedded web servers for easy administration. Unfortunately, many of these devices are mostly unprotected due to lapses in configuration. Some servers are not configured properly (can be accessed using the default user name and password), or are left with no means of protection. What’s worse […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments