HITBSecConf2017 Amsterdam (April 10th - 14th)
Register Online Now!
Electric cars are attracting more buyers than ever before. Although the now more sporting looking vehicles may be better for the environment, they pose a great risk to the power grid. Not only are power grid segments in some cities already too overly burdened to sustain increased usage by a multitude of charging electric cars, the “refueling” stations themselves are reportedly extremely susceptible to cyber hacking.
There has been much sniggering into sleeves after wags found they could upset iOS 6 iPhones and iPads, and Macs running OS X 10.8, by sending a simple rogue text message or email.
A bug is triggered when the CoreText component in the vulnerable Apple operating systems tries to render on screen a particular sequence of Unicode characters: the kernel reacts by killing the running program, be it your web browser, message client, Twitter app or whatever tried to use CoreText to display the naughty string.
L33tdawg: An interview with Microsoft's Katie Moussouris shot at #HITB2013AMS in May.
NATO has released a short video, looking at the “hacker” phenomenon.
By hackers they aren’t just talking about the stereotypical malicious hacker, bent over a keyboard in a darkened room while wearing a hoody (although one of them does appear in the video), but also vulnerability researchers who find security holes in systems.
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. He talks about security management, fraud, identity management, governance, risk and compliance.
The organizers of the Hack In The Box (HITB) security conference have managed to publish the complete videos of all the talks from #HITB2013AMS.
So, in case you haven’t made it to the conference, or if you want to take another look at one of the many interesting presentations, check out the official HITB YouTube channel.