Archive for the ‘vulnerability assessment’ Category

DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

July 14th, 2016

Why we can’t detect all security loopholes and patch them before hackers exploit them?

Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.

Now to solve this hurdle, DARPA

Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)