Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘Supercomputers’
Most Recent
 
Read More
August 5, 2016

The Future of Cybersecurity May Be with Supercomputers

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities.

Taking place in Las Vegas at DEF CON, a cybersecurity event, the seven supercomputers participated in the Cyber Grand Challenge where they were tasked with playing the hacking game Capture the Flag, which focuses on detecting software vulnerabilities.

It’s usually human hackers who take part in the game to detect vulnerabilities; however, it often takes humans a lot longer to identify flaws compared to supercomputers.

According to PC World, at the recent DEF CON conference, no human hackers took part, only the [...]

55833
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University