ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Facebook wants to teach you how to hack | #ICT #CyberSecurity #OpenSource 

Facebook wants to teach you how to hack | #ICT #CyberSecurity #OpenSource  | ICT Security-Sécurité PC et Internet | Scoop.it
Facebook wants to teach the next generation security skills and hopes the release of the Capture the Flag (CTF) platform to the open-source community will be a valuable contribution.

Gulshan Singh, a software engineer on Facebook's threat infrastructure team said in an announcement on Wednesday the social media giant hopes to make "security education easier and more accessible," especially for students.

As a result, the company has decided to release the CTF platform as a "safe and legal" way to teach kids how to learn and refine skills related to reverse-engineering, forensics, web application security, cryptography, and binary exploitation without getting into trouble with the law.

It is rare for schools to build and run their own CTF environments, and there are few currently available on the market. Beyond web domains configured for network professionals to test out their skills, such as Hack this site.org, security education resources geared towards students can be a challenge.

 

Gust MEES's insight:

Facebook wants to teach the next generation security skills and hopes the release of the Capture the Flag (CTF) platform to the open-source community will be a valuable contribution.

Gulshan Singh, a software engineer on Facebook's threat infrastructure team said in an announcement on Wednesday the social media giant hopes to make "security education easier and more accessible," especially for students.

As a result, the company has decided to release the CTF platform as a "safe and legal" way to teach kids how to learn and refine skills related to reverse-engineering, forensics, web application security, cryptography, and binary exploitation without getting into trouble with the law.

It is rare for schools to build and run their own CTF environments, and there are few currently available on the market. Beyond web domains configured for network professionals to test out their skills, such as Hack this site.org, security education resources geared towards students can be a challenge.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP BeNeLux 2012 - Invitation

OWASP BeNeLux 2012 - Invitation | ICT Security-Sécurité PC et Internet | Scoop.it
Quick Facts


Date : 29-30 Novembre
Location: Leuven (Belgium)
Price : Free
Places : Limited (First registered, First serve)

Agenda
The agenda is a sound mix between Application Security, Forensics, Risk Management and represents the current security landscape at large rather well: Building security into Applications in Enterprises, Managing Application Level Vulnerabilities, Source code review on a large scale. It also has 2 innovative talks on exploit mitigation and sandboxing javascript.

 

- Browser Security - John Wilander


- Sandboxing Javascript - Lieven Desmet


- Body Armor for Binaries - Asia Slowinska


- Forensics - Marc Hullegie and Kees Mastwijk


- Streamlining Application Vulnerability Management: Communication Between Development and Security Teams - Dan Cornell


- Code review for Large Companies - Ruediger Bachmann


- Making Security Invisible by Becoming the Developer’s Best Friends - Dinis Cruz


- OWASP Top 10 vs Drupal - Erwin Geirnaert


- Panel Discussion about the legal aspects of penetration testing

 

Learn more:

http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

XMCO-ActuSecu-33-Forensics-Part1 [pdf]

Investigations Forensics


Votre Mac est-il infecté ?


Conférences


Actualité du moment


Retours d’expériences sur plusieurs types d’attaques et les profils des pirates.
10 astuces pour vérifier si votre machine est compromise


Hack.Iu et BRUCon


Analyses de Mini-Flame, de la vulnérabilité «Authentec Protector Suite» et
de l’effacement des téléphones Samsung à distance

 

Gust MEES's insight:

Toujours un MUST et un plaisir à lire...

 

Gust MEES's curator insight, January 18, 2013 11:17 AM

Toujours un MUST et un plaisir à lire..