Security Experts:

RSA Conference 2012
long dotted


RSA executives Art Coviello and Tom Heiser addressed outdated security models, practices and technologies holding back security teams from effectively protecting their organizations against evolving risks and advanced threats.
McAfee security researchers demonstrated how an iPad can be compromised if a user were to log on to WiFi using a rogue access point. From there, an attacker launching a man-in-the-middle (MitM) attack would inject an iFrame into whatever site the user visits and install malware that essentially roots the device.
Electromagnetic emissions coming off your mobile device may be leaking cryptographic information, according to research by Cryptography Research, Inc.
Last week, the SecurityWeek team was in San Francisco for the annual RSA Conference (RSAC). All week long we covered the news from the show floor, as well as various interviews and photos.
[Video] At the RSA Conference 2012, FBI Director Mueller discussed the cyber threat to our nation's security and economic prosperity, what the FBI is doing to combat this threat, and why it is imperative that law enforcement and the private sector work together to protect the safety and security of our citizens.
Dell SecureWorks pulled the covers off of a cyber-espionage operation that compromised as many as 200 computers – many belonging to government ministries in Vietnam, Brunei and Myanmar.
The effort will be led by the Trustworthy Internet Movement (TIM), a nonprofit created to take on issues such as SSL governance and the spread of botnets and malware. TIM is built around three core pillars:
Photos from around the RSA Conference taken on Wednesday, February 29, 2012 at the Moscone Center in San Francisco.
The countries with the most capability do not necessarily have the most interest in launching the types of attacks against the United States that make for movie plots, a panel of experts said at the RSA Conference Wednesday.
Photos from Monday and Tuesday at the RSA Conference 2012 in San Francisco

FEATURES, INSIGHTS // RSA Conference 2012

rss icon

Noa Bar-Yosef's picture
In this column we’ll take a look at the basics of public key cryptography and how it works, along with a brief history of RSA - creators of this breakthrough security solution.