Why we can’t detect all security loopholes and patch them before hackers exploit them?
Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.
Now to solve this hurdle, DARPA
Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)
The United States Department of Defense (DoD) has the plan to boost their internal and network security by announcing what it calls “the first cyber Bug Bounty Program in the history of the federal government,” officially inviting hackers to take up the challenge.
Dubbed “Hack the Pentagon,” the bug bounty program invites the hackers and security researchers only from the United States to
Posted in Bug Bounty Program, capture the flag, ethical hacking training, Hack the Pentagon, hacking competition, hacking conference, hacking news, The Pentagon, United States, US Military | Comments (0)
Great news for Hackers and Bug-hunters who enjoy Programming and playing around with Software.
A worldwide group of like-minded computer programmers is hosting The Next Hacker IPPC event on the 26th and 27th of February in Berlin, Germany, where participants can meet hackers and programmers from around the world while getting an opportunity to participate in one of the major
Posted in bug hunting, hackathon, hacker next conference, hacking competition, hacking conference, Java, Java Programming, Programming, Programming competition | Comments (0)
The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm.
Terrorists involved in Cyber Espionage and Operations aim at gaining access to Nation’s critical infrastructure involving both Government as well as Private sectors.
The Frequency and Intensity of such Cyber-attacks are increasing rapidly and extending into absolute
Posted in Cyber Attack, cyber espionage, Cyber Terrorism, cyber war, hacking conference, hacking news, Indian Hackers, Pakistan, terrorist groups, Zero-Day Vulnerability | Comments (0)