Computer Security
Technical Committee

[switch to italian]


   
    Call-for Papers (deadlines) [more]
11 Dec 2016AEIJ 2016 : Advanced Energy: An International Journal
11 Dec 2016IJNSA 2016 : International Journal of Network Security & Its Applications
11 Dec 2016 IJSEA 2016 : International Journal of Software Engineering & Applications
 
  Wired Threat Level [more]
» The Election Is Over. The Probe Into Russian Hacks Shouldnt Be
» This App Wants to Be Your Encrypted, Self-Destructing Slack
» Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump
 

News

Survey On Cybercrime - CyberROAD Project

   
 

SANS Tip of the Day:

Kids and Screenshots

 

 

SearchSecurity: Security Wire Daily News
09 Dec 2016IBM's Watson for Cybersecurity puts a new face on machine learning
09 Dec 2016Experts unsure if cyber attribution research will yield results
09 Dec 2016More internet-connected devices plagued by attacks, vulnerabilities
09 Dec 2016How did Ammyy Admin software get repeatedly abused by malware?
09 Dec 2016Is a GRE tunnel or IPsec tunnel more secure for enterprise use?
08 Dec 2016Keydnap malware: How does it steal Mac passwords?
07 Dec 2016Exploit kit delivered via malvertising targets unpatched systems
07 Dec 2016Experts debate the key points of the final Obama cybersecurity report
07 Dec 2016How symmetric and asymmetric encryption algorithms differ
06 Dec 2016CryptXXX: How does this ransomware spread through legitimate websites?
06 Dec 2016How to prepare for a cloud DDoS attack on an enterprise
05 Dec 2016What should happen after an employee clicks on a malicious link?
02 Dec 2016Android app security tested by malware and vulnerabilities
02 Dec 2016C-level unclear on governance, risk and compliance responsibility
02 Dec 2016EU, U.S. authorities take down Avalanche global crimeware network
02 Dec 2016Patched Tor browser vulnerability puts users' identity at risk
02 Dec 2016How do the Linux kernel memory protection features on Android work?
01 Dec 2016Data obfuscation techniques: Best practices and design approaches
30 Nov 2016Modified Mirai botnet could infect five million routers
30 Nov 2016Last ditch Senate efforts fail to stall Rule 41 changes