Every month there are numerous cyber security conferences all around the world. Many of them post their talks on YouTube after the conference. The article lists talks from numerous security conferences. Go on, attend a free security conference from the comfort of your home or office!
Security researchers from the University of Trier have discovered a couple of vulnerabilities in the OAuth 2.0 authentication protocol that could enable hackers to subvert single sign-on systems. The protocol is widely used on social networking sites, such as Facebook and Google+, to authenticate users.
After analyzing the information that has been made available by affected power companies, researchers, and the media it is clear that cyber attacks were directly responsible for power outages in Ukraine.
Google's Project Zero discovered multiple trivial remote code execution vulnerabilities sitting within a password manager installed by Trend Micro as default alongside its AntiVirus product. An attacker could thereby obtain an unecnrypted dump of all stored logins and passwords.