10 tips for creating your security hackathon playbook

For more than 12 years, I’ve been organizing and running hackathons with the goal of finding security vulnerabilities and fixing them before a product hits the market. These events can play a pivotal role in the product development lifecycle, increasin… Continue reading 10 tips for creating your security hackathon playbook

Attribute-based encryption could spell the end of data compromise

The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need ways to put data to the best use while protecting against breaches and ensuring privacy, data protection and access control. These principle… Continue reading Attribute-based encryption could spell the end of data compromise

Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories. Continue reading Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

Hack a Tesla Model 3, get cash and the car

For this year’s edition of the Pwn2Own hacking contest at CanSecWest, Trend Micro’s Zero Day Initiative has announced a new target category: Automotive. So, aside from striving to hack a variety of virtualization solutions, web browsers, enterpri… Continue reading Hack a Tesla Model 3, get cash and the car

FTC Issues Public Challenge to Improve IoT Patching

The FTC announced the IoT Home Inspector Challenge, a contest with the goal of coming up with a patching solution fit for consumer-grade connected devices used in the home. Continue reading FTC Issues Public Challenge to Improve IoT Patching