The Last HITB Security Conference in Malaysia

Hands-on Technical Trainings - 13th & 14th October

http://conference.hitb.org/hitbsecconf2014kul/#tile_schedule

Triple-Track Conference - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/conference-speakers/

 

Capture the Flag - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/capture-the-flag/

HackWEEKDAY - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/hackweekday/

CommSec Village - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/commsec-village/

REGISTER ONLINE NOW

Researchers to patent vulnerability search algorithm

http://www.flickr.com/photos/brewbooks/1412192595/

Melbourne-based researchers are looking to commercialise a search algorithm that analyses networks to identify the most easily exploitable vulnerability chains.

The algorithm was developed by Swinburne University associate professor Hai Vu to help network operators prioritise how they protect networks that are unfortunately "never 100 percent secure”.

Vu said too many vulnerabilities typically occurred in software, operating systems and other networking components for it to be financially feasible to eliminate all of them. Hackers may exploit chains of such vulnerabilities to achieve malicious objectives, such as data theft or denial of service attacks, he warned.

Tags: