Computer Security
Technical Committee

[switch to italian]

    Call-for Papers (deadlines) [more]
02 Mar 2015ARES 2015 : The 10th International Conference on Availability, Reliability and Security, Toulouse, Aug 24, 2015 - Aug 28, 2015
02 Mar 2015IWCMC15-Security 2015 : IWCMC'15 - Trust, Privacy and Security Symposium, Durbovnik, Croatia, Aug 24, 2015 - Aug 27, 2015
02 Mar 2015SAFECOMP 2015 : SAFECOMP 2015 : The 34rd International Conference on Computer Safety, Reliability and Security, Delft, Sep 22, 2015 - Sep 25, 2015
  Wired Threat Level [more]
» Aspiring Israeli Singer Indicted for Hacking Madonna Since 2012
» How to Sabotage Encryption Software (And Not Get Caught)
» Gemalto Confirms It Was Hacked But Insists the NSA Didnt Get Its Crypto Keys


Survey On Cybercrime - CyberROAD Project


SANS Tip of the Day:

When you log out, log out completely



SearchSecurity: Security Wire Daily News
27 Feb 2015Data breach consequences: Get breached, make money?
26 Feb 2015HP: Threat intelligence sources need vetting, regression testing
26 Feb 2015Google security scanner bolsters secure cloud application development
25 Feb 2015Google Project Zero changes fuel new vulnerability disclosures debate
24 Feb 2015Macro viruses reemerge in Word, Excel files
23 Feb 2015Vendor: Slow DMARC email authentication uptake leaves email vulnerable
23 Feb 2015Cisco touts OpenAppID for internal application traffic visibility
20 Feb 2015Maintaining vendor trust proves tough for Lenovo, Microsoft
17 Feb 2015UTM vs. NGFW: Unique products or advertising semantics?
16 Feb 2015Carbanak bank malware attack causes nearly $1 billion in losses
16 Feb 2015Cloud security certifications: How important are they?
10 Feb 2015February 2015 Patch Tuesday: Group Policy flaw tops three critical fixes
10 Feb 2015Box introduces BYOK encryption key management service
10 Feb 2015Voltage Security acquisition to bolster HP's data protection offerings
06 Feb 2015How should organizations make a cybersecurity policy a top priority?
06 Feb 2015SSL/TLS security: Addressing WinShock, the Schannel vulnerability
06 Feb 2015Same-origin policy IE vulnerability may signal new attack trend
06 Feb 2015Budget, breach law highlight growing federal cybersecurity awareness
06 Feb 2015Report: Most enterprise security operations centers ineffective
05 Feb 2015How to procure email encryption software