Virus Bulletin, Dallas 2012 – Konferenzbericht
Dieser Artikel wurde von Adrian Leuenberger geschrieben. Jedes Jahr findet die „Virus Bulletin“-Konferenz abwechselnd in Europa und Nordamerika statt. Die Konferenz gilt allgemein als eine Art...
View Articlehashdays 2012 – Security-Konferenzbericht
Dieser Artikel wurde von Peter Haag geschrieben. Vom 31. Oktober bis 3. November fanden dieses Jahr wieder die Hashdays statt. Es war die dritte Auflage dieser sehr erfolgreichen Security-Konferenz in...
View ArticleCherries from the Belgian Internet Security Conference
Last week I was invited to the first Belgian Internet Security Conference in Brussels to talk about our Malware Domain program. The conference was hosted by Belnet, our Belgian sister NREN. Belnet also...
View ArticleIT-Security-Links – Week 2
29c3 “Not My Department”: Lots of Conference Videos of the 29th installment of the Chaos Communication Congress are available for download. And Stefano Ortolani wrote a report on the Chaos...
View ArticleONE: The first NCSC conference
A year ago GovCERT.nl ceased to exist. The new kid on the block was the National Cyber Security Center (NCSC). Together with GovCERT.nl their famous conference went away and many were wondering if...
View ArticleIT-Security-Links – Week 9
The annual RSA Conference – a major gathering of cyber security companies and security experts – has taken place this week. Videos of the Keynotes are now available. At the Cryptographers’ Panel Adi...
View ArticleIT-Security-Links – Week 11
“The quieter you become, the more you are able to hear.”: BackTrack, the well known tool suite for penetration testing is now called Kali Linux. Read more about what has changed here. BlackHat: Xavier...
View ArticleIT-Security-Links – Week 20/21
HITB2013AMS: Videos from Day 1 of the the Security Conference ‘Hack in the box’ are now available on youtube. FIRST: The first security podcasts of the 25th Annual FIRST Conference podcast series can...
View ArticleNeues aus dem IPv6-Universum
Was tut sich in Sachen IPv6? Dieser Juni war der Monat der IPv6-Konferenzen. Am 6. und 7.6. fand in Frankfurt/Main der fünfte Heise IPv6-Kongress statt. Eine Woche später gab es die vom Swiss IPv6...
View ArticleCSIRTs – Sharing to Win
Einbrüche in Datenbanken, gestohlene persönliche Daten, manipulierte Transaktionen im E-Banking, Eingriffe von staatlichen Akteuren in die Kommunikation im Internet und Angriffe auf die Verfügbarkeit...
View ArticleIT-Security-Links – Week 28
DEF CON 21, Black Hat 2013 and the NSA: We need some time apart – DEF CON founder Jeff Moss has asked federal agents not to attend this year’s DEF CON. At the same time the Director of the NSA,...
View ArticleIT-Security-Links – Week 31
The Washington Post published an article by Andrea Peterson on why stolen European credit card numbers cost 5 times as much as U.S. ones on the underground market. There are several reasons for this,...
View ArticleIT-Security-Links – Week 41/42
HITB2013KUL: The Security Conference ‘Hack in the Box‘ took place this week. Slides of the talks are available here. Malware “Dexter”: Infected point-of-sale terminals in South African restaurants...
View ArticleIT-Security-Links – Week 43
VB2013 / hack.lu 2013: Slides from the Virus Bulletin 2013 Security Conference in Berlin are available now… …as well as the slides from hack.lu 2013. Security 101: Watering holes remove the challenge...
View ArticleIT-Security-Links – Week 49/50
BotConf2013: The ‘first botnet fighting conference’ took place in Nantes, France. And the slides are available. COPS: Talks & slides of the ‘Congress on Privacy & Surveillance‘ held at the...
View ArticleIT-Security-Links – Week 1/2
HITB2013: Hack in the box published their quarterly magazine with hot security topics from the last HITB security conference. Free download, 102 pages. Windows XP: According to Kaspersky 18% of...
View ArticleIT-Security-Links – Week 9
The ICC Belgium published a 72-page Cyber Security Guide including a Security Self Assessment Questionnaire. Have you heard about the Security Bloggers Network? It’s the largest collection of...
View ArticleTroopers14 IPv6 Security-Summit – Konferenzbericht
“Trojanisches Pferd” am Eingang des Security Summits Im Rahmen der alljährlich stattfindenen IT-Securitykonferenz Troopers gab es in diesem Jahr bereits zum zweiten mal einen IPv6 Security-Summit. Zwei...
View ArticleIT-Security-Links – Week 25/26
Troopers14: 27 talks from this years Security Conference Troopers are available online…. HITB2014: …as well as a choice of presentation slides from Hack-in-the-box… IPv6 Security: …and the recently...
View ArticleIT-Security-Links – Week 27/28
The NSA targets the privacy-conscious: Searching the web for privacy-enhancing software tools causes the NSA to mark and track the IP address of the person doing the search. REcon 2014: The...
View ArticleIT-Security-Links – Week 32/33
Black Hat USA 2014: The talks from this years Black Hat Security Conference in Las Vegas are now available online… DEF CON 22: …and some first videos from DEF CON 22 are uploaded as well. If you don’t...
View Article
More Pages to Explore .....