How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Supercomputers’
Most Recent
Read More
August 5, 2016

The Future of Cybersecurity May Be with Supercomputers

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities.

Taking place in Las Vegas at DEF CON, a cybersecurity event, the seven supercomputers participated in the Cyber Grand Challenge where they were tasked with playing the hacking game Capture the Flag, which focuses on detecting software vulnerabilities.

It’s usually human hackers who take part in the game to detect vulnerabilities; however, it often takes humans a lot longer to identify flaws compared to supercomputers.

According to PC World, at the recent DEF CON conference, no human hackers took part, only the [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University