Security Researchers Sound Off on Proposed US Wassenaar Rules
Influential security researchers have begun publishing their comments, objections and concerns regarding the proposed U.S. export control rules under the Wassenaar Arrangement.
View ArticleBug Bounties in Crosshairs of Proposed US Wassenaar Rules
Bug bounties and rewards programs provide researchers with a measure of income, and if the proposed Wassenaar rules are implemented in the U.S., that initiatives could be adversely impacted.
View ArticleUK Student’s Research a Wassenaar Casualty
Grant Wilcox, an ethical hacking degree candidate at the University of Northumbria in the U.K., said the Wassenaar Arrangement rules were one reason he decided not to publish exploits he developed for...
View ArticleCoalition of Security Companies Forms to Oppose Wassenaar Rules
A large group of security companies have formed a coalition to oppose the proposed rules from the Department of Commerce that would regulate the export of so-called intrusion software, a broad term...
View ArticleUnusual Re-Do of US Wassenaar Rules Applauded
The U.S. Commerce Department this week agreed to rewrite the proposed U.S. implementation of the Wassenaar Arrangement, a decision lauded by security experts.
View Article‘Prohibition Era’ Of Security Research May Be Ahead
LAS VEGAS–Export controls have become a dirty phrase in the security community, especially among researchers, pen testers, and others who rely on vulnerability information and exploits to do their...
View Article‘Prohibition Era’ Of Security Research May Be Ahead
If the Wassenaar Arrangement rules proposed by the United States aren't modified significantly before they're implemented, dark days may lie ahead for the research community, experts say.
View ArticleThreatpost’s 2015 Year in Review
With 2015 more or less in the rear view mirror Mike Mimoso and Chris Brook discuss the year in security: Wassenaar, ransomware, mobile threats like Stagefright, Carbanak and Equation Group, and more.
View ArticleSix Things to Watch for in 2016
Computer security research and innovation took a beating in 2015. Some prep work in advance might help us cope next year. Here are six things to keep in mind.
View ArticleKatie Moussouris on Bug Bounty Programs, Hack the Army, and Wassenaar
Katie Moussouris on how bug bounty programs have gone mainstream, the success of Hack the Pentagon and Hack the Army, and where things stand with the Wassenaar Arrangement.
View Article
More Pages to Explore .....