Understanding Proactive Cyber Security

In today’s growing digital marketspace, we are seeing a near continuous emergence of Small and Medium Sized Enterprises (SMEs) that are…
11/30, 7:00 PM: 19:00 – 19:30: Networking Reception19:30 – 20:15: Presentation by Bruce Pon and Chirdeep Chhabra20:15 – 20:30: Q&A from audience20:30 – 21:30: Networking Reception with free food a

Cybersecurity in Asia needs to be taken seriously.

It looks like you may be having problems playing this video. If so, please try restarting your browser.
Posted by Horangi

Our friends from Embassy of Switzerland in the Republic of Korea are inviting our members to participate in Pitch Contest.

Image may contain: text

Dear techies. Exciting news! Red Herring Asia Award invited Seoul Tech Society to submit its candidature. Please, support us with sharing a good word on our page if we helped you to start a new project, discover new colleagues or just inspired for new actions in your life.
What is memory forensics? Why is it important? You will know what it is exactly through this article. Check our Horangi's latest posting.

Memory Forensics is the analysis of a computer’s memory. This is a fast growing area of research that is necessary for digital forensics…
What you and your company can learn from the WannaCryOutbreak!
If you want to know more about Wannacry, check our latest Horangi article.

What is WanaCrypt0r anyway?
Security Brief Asia has featured an article by Horangi Cyber-Operations Consultant Aung Myo Mint!
Check out the article for the latest on ransomware

It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia

Good for expanding knowledge of cyber security.

Check out Sniper Forensics Part Deux!

As we discussed in part one, Sniper Forensics is an investigative methodology originally created by Chris Pogue and focused on delivering…

Check out our Decoding Open Source Intelligence article.

For a lot of people, information security in an organization all happens under the hood. At the user-level there may be distinguishable…

March,9 (Thursday) 7:30pm at DCAMP
With the help of cyber security experts from Horangi we will introduce trends of web security threats and facilitate discussion about the current state of cyber security and why it is relevant for everyone: final users, small and medium businesses, independent developers and huge corporations.

Image may contain: text
Image may contain: 1 person, meme and text
In public-key cryptography, a key signing party is an event at which people present their public keys to others in person. The key signing party facilitates web of trust approach. And no worries, Secu

We will be at FOSDEM at 4 & 5 February 2017, join us at this event organized by our friends source{d}.

Image may contain: text
Hello fellow devs, We are starting the new year with a meetup to discuss serverless architecture and the Serverless Framework. Serverless computing will help you to focus on your code to build scalab

This Tuesday Seoul Tech will celebrate 4th anniversary! Let's meet at HIVE ARENA : Coworking space in seoul and have some beer!

No automatic alt text available.

More interesting meetups in Seoul, discover hottest JS trends at Seoul Web Technology Meetup this Wednesday

Hello all, We're back! 2016 has been a prolific year for JavaScript language: new standards, new frameworks and new tools. Who knows how many will come out at JS camp? Save the date and discover