Black Hat USA Archives are live!

Click Here to Check Out the USA Archives Site | more info

  • August 14 2014 | MIT Technology Review

    Q&A: Former NSA Deputy Director John C. Inglis

    At the Black Hat computer security conference in Las Vegas last week, Rachel Marsden put some of those questions to John C. Inglis, who retired as deputy director of the NSA in January.
    Read More
  • August 14 2014 | Help Net Security

    Continuous monitoring for your perimeter

    In this podcast recorded at Black Hat USA 2014, Sumedh Thakar, Chief Product Officer at Qualys, talks about a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems.
    Read More
  • August 14 2014 | Help Net Security

    86% of hackers don’t worry about repercussions

    Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face repercussions for their activities. In a double-edged sword conundrum, 88% of respondents also believe their own personally identifiable information (PII) is at risk of online theft.
    Read More
  • August 12 2014 | Help Net Security

    The dangers of backdoor passwords

    In this podcast recorded at Black Hat USA 2014, Billy Rios, Director of Threat Intelligence at Qualys, illustrates how backdoor passwords get put into devices, how they manifest themselves, and the implications they bring.
    Read More
  • August 12 2014 | Help Net Security

    Square launches bug bounty program

    The announcement was made at a panel at the Black Hat security conference last week by security expert and well-known bug hunter Dino Dai Zovi, who has recently been hired by the Square, likely to take charge of the bug finding and fixing efforts.
    Read More
  • August 12 2014 | Help Net Security

    How fast can security pros detect a breach?

    Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas.
    Read More
  • August 11 2014 | Help Net Security

    US switch to chip-and-PIN cards not a panacea for fraud

    While the change is welcome, it is by no means a panacea for payment card fraud. The chip-and-PIN system definitely has its (exploitable) flaws, and only some of them have been addressed, Ross Anderson, a security engineering professor at the University of Cambridge in the UK, who along with his colleagues has been testing the security of payment systems for years, noted in his presentation at the Black Hat security conference.
    Read More
  • August 11 2014 | Help Net Security

    A walk through Black Hat USA 2014

    Here's a walk through video of the Business Hall at Black Hat USA 2014.
    Read More
  • August 11 2014 | Help Net Security

    Smart Nest thermostat easily turned into spying device

    At this year's edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by Nest.
    Read More
  • August 11 2014 | CSO

    The making of a cybercrime market

    At this year's Black Hat conference, I had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT—Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.
    Read More
  • August 10 2014 | VentureBeat

    Hello, Dave. I control your thermostat. Google’s Nest gets hacked

    But hackers at the Black Hat security conference this week made those words appear on a Nest display after they showed how they compromised the device in front of an audience of hundreds.
    Read More
  • August 10 2014 | VentureBeat

    The clash of cultures between Black Hat and Defcon hacker events

    Hordes of security professionals, hackers, federal agents and media invaded Las Vegas this week to attend the Black Hat and Defcon conferences.
    Read More
  • August 8 2014 | Examiner

    Examiner

    Presentations at this year’s conference demonstrated successful hacks of cars, cellphones (all platforms), energy management systems, Google Glass, chip and pin cards, and even luxury hotels.
    Read More
  • August 8 2014 | VentureBeat

    Airplane satellite communications are expensive – and not so hard to hack

    That was the gist of a talk by Ruben Santamarta, a security researcher at IOActive, at the Black Hat security conference in Las Vegas.
    Read More
  • August 8 2014 | golem.de

    Scan the Internet

    Mark Schloesser of the company Rapid7 reported at the Black Hat 2014 about the experiences with Internet-wide scans.
    Read More
  • August 8 2014 | Help Net Security

    Free Android app identifies and uninstalls spyware

    At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices.
    Read More
  • August 8 2014 | Help Net Security

    Yahoo will offer end-to-end mail encryption by 2015

    At Black Hat in Las Vegas on Thursday, Yahoo CISO Alex Stamos has announced that the company will be implementing end-to-end encryption for Yahoo Mail, and will do so by using a modified version of the End-to-End browser plugin created by Google.
    Read More
  • August 8 2014 | Help Net Security

    Unified solution for dynamic mitigation of cyberattacks

    At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a cyber intelligence company that enables the disruption of cyberattacks in real time, announced a partnership and plans to enable the ThreatStream OPTIC platform to interoperate with ForeScout’s CounterACT platform.
    Read More
  • August 8 2014 | Help Net Security

    Mocana offers an alternative to OpenSSL on Apache web servers

    At the Black Hat USA 2014 conference, Mocana debuted its enterprise-grade NorthStar secure connectivity solution for Apache web servers, a highly secure, drop-in replacement for the vulnerability-prone and widely adopted OpenSSL stack.
    Read More
  • August 8 2014 | Help Net Security

    End-to-end encryption hardware for unsecure networks

    x.o.ware has debuted the ExoNetTM VPEx Gateway and its companion product, the ExoKey Secure Communications Extension, this week at Black Hat USA 2014.
    Read More
  • August 8 2014 | Help Net Security

    Serious flaws in cell phone carrier control software found

    At the Black Hat conference this week, two Accuvant researchers havedisclosed serious security flaws in the carrier control software used in over 2 billion cellular devices across platforms and carriers.
    Read More
  • August 8 2014 | golem.de

    What betray encrypted channels

    At the Black Hat 2014 presented both at HP hired security researcher Brandon Niemczyk and Prasad Rao, a tool with which the data traffic can be analyzed.
    Read More
  • August 8 2014 | Zeit Online

    Yahoo wants to introduce end-to-end encryption

    This was announced by Yahoo's security chief Alexander Stamos at Black Hat 2014
    Read More
  • August 8 2014 | My News 3

    Hackers meet at Black Hat convention to tackle cybersecurity risks

    Experts on the leading edge of cyber-security claim they are tackling the threat: “We're finding that there are vulnerabilities pretty much everywhere,” said Meredith Corley, spokeswoman for Black Hat.
    Read More
  • August 8 2014 | TechCrunch

    Notes From Crazytown, Day Three: Black Hat Breakdown

    So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, all USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societies, and my sense of the ridiculous.
    Read More
  • August 8 2014 | LA Times

    Security firm scouts Black Hat for part-time hackers

    At this week’s Black Hat conference in Las Vegas, companies from around the world came to recruit the brightest minds in cybersecurity and offer them full-time jobs.
    Read More
  • August 8 2014 | International Business Times

    Yahoo Joins Google Bringing End-to-End Encryption to Mail

    At the Black Hat hackers' conference in Las Vegas on Thursday, Yahoo's chief security officer Alex Stamos announced that from this autumn Yahoo mail users will be able to send encrypted emails to other users as well as users of Google's popular Gmail service.
    Read More
  • August 8 2014 | Bloomberg

    Your Wi-Fi Router Might Flood Your House

    The keynote speaker there, Dan Geer, who works for the U.S. Central Intelligence Agency's venture capital arm, has already said that home routers could be used to create a hacker-controlled botnet that "could probably take down the Internet." In fact, router botnets have already been built -- just for experimentation's sake, you understand.
    Read More
  • August 8 2014 | Daily Mail

    The 20 most hackable CARS revealed: Report lists the smart vehicles that are most at risk of having their systems hijacked

    Results were published in a 92-page report and presented at the Black Hat conference in Las Vegas
    Read More
  • August 8 2014 | Infosecurity Magazine

    BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

    Jay Radcliffe, a security researcher who has focused a bulk of his attention to medical device security, led a roundtable discussion on the real state of medical device security at the Black Hat conference on Thursday.
    Read More
  • August 8 2014 | SC Magazine UK

    2 billion mobile devices vulnerable: Black Hat report

    Hidden controls found in a wide array of devices — from smart phones and laptops to embedded M2M devices and some cars — could be leveraged by attackers for wide scale exploitation, researchers from Accuvant Labs reported on Wednesday at the 2014 Black Hat conference in Las Vegas.
    Read More
  • August 8 2014 | Lemonde Informatique

    Black Hat 2014: USB keys can be reprogrammed to infect computers

    The firmware flash drives is not protected and can be easily rewritten by malware showed this week the Berlin researchers Security Research Labs, the BlackHat conference in Las Vegas.
    Read More
  • August 8 2014 | IT World Canada

    New networking protocol endangers security, Black Hat conference told

    The annual Black Hat security conferences are usually fountains of black news — another exploit discovered! criminals are partnering!
    Read More
  • August 8 2014 | Mashable

    How to Hack an Airplane's Satellite Communications System

    Ruben Santamarta, a security researcher at IOActive, showed a packed room at the Black Hatsecurity conference in Las Vegas on Thursday how several types of satellite communications equipment used in airplanes all over the world can be hacked. Taking advantage of "critical" holes in these devices, an attacker could tamper with the plane's satellite communications, he said, interfering with its navigation and safety systems.
    Read More
  • August 7 2014 | Dark Reading

    No Fixes In Sight For Satellite Terminal Flaws

    Santamarta in a presentation on his research here Thursday at Black Hat USA said the satellite terminal vendors with gaping holes in their products have no plans to patch or fix the shortcomings, which include hardcoded passwords, backdoors, insecure protocols and undocumented protocols.
    Read More
  • August 7 2014 | TechCrunch

    Square Will Now Pay Hackers For Reporting Bugs Responsibly

    Last night at the BlackHat security conference, Square‘s resident hacker Dino Dai Zoviannounced that the company would be launching a bug bounty program soon. This morning, that program went live.
    Read More
  • August 7 2014 | The Register

    Americans to be guinea pigs in vast chip-and-PIN security experiment

    Chip-and-PIN systems aren't perfect, said Ross Anderson, a professor of security engineering at the UK's University of Cambridge, in a presentation today at the Black Hat USA hacking conference in Las Vegas.
    Read More
  • August 7 2014 | IEEE Spectrum

    Black Hat 2014: A New Smartcard Hack

    The work is being presented at this week’s Black Hat 2014 digital security conference in Las Vegas.
    Read More
  • August 7 2014 | Forbes

    The Snowden Effect: Yahoo To Join Gmail In Offering Users End-To-End Encryption

    At Black Hat in Las Vegas on Thursday, Stamos announced that the encryption train is making another stop.
    Read More
  • August 7 2014 | Infosecurity Magazine

    Black Hat 2014 Keynote: What InfoSec Needs to Do

    In a far-ranging speech, Geer outlined 10 policy proposals “on a suite of pressing current topics,” such as government surveillance, embedded systems security, net neutrality, the right to be forgotten, and the state of vulnerability research and disclosure, to name just a few. Geer warned the proposals were not fully formed, but what they lacked in details, they made up for it in the range covered.
    Read More
  • August 7 2014 | Help Net Security

    Deploying and monitoring honeypots made easy

    At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and generate targeted threat intelligence that facilitates an ongoing adaptive defense posture.
    Read More
  • August 7 2014 | Help Net Security

    Symantec issues update fixing Endpoint Protection zero-day

    Offensive Security has shared information about some of the found vulnerabilities with CERTs, but others have been studied during the company's Advanced Windows Exploitation (AWE) course at the Black Hat 2014 conference this week.
    Read More
  • August 7 2014 | Help Net Security

    CIA’s venture firm CISO offers singular solutions for cyber problems

    In a eclectic keynote delivered to the Black Hat conference audience, Dan Geer, CISO at In-Q-Tel, made known his thoughts on and ideas about a number of things: from Internet voting to vulnerability finding, from net neutrality to the right to be forgotten.
    Read More
  • August 7 2014 | Network World

    Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate

    The U.S. government should pay 10 times the going rate for zero-day software flaws in order to corner the market and then make those vulnerabilities public to render them less potent for attackers, Black hat 2014 attendees were told yesterday.
    Read More
  • August 7 2014 | Wall Street Journal

    Yahoo Joins Google Effort to Encrypt Email

    “We have to make it to clear to people it is not secret you’re emailing your priest,” Stamos said in an interview at the Black Hat security conference here. “But the content of what you’re emailing him is secret.”
    Read More
  • August 7 2014 | TechCrunch

    Yahoo To Strengthen Email Encryption

    The company made the announcement on stage at the Black Hat security conference earlier today.
    Read More
  • August 7 2014 | FOX News

    Evil USBs to bitcoin botnets: Hackers hit Vegas

    Evil USBs, Google Glasses capturing your passwords and bitcoin mining are just a few of the tactics that top hackers from around the world are bringing to Vegas for the Black Hat conference this week.
    Read More
  • August 7 2014 | ZDnet

    Best in Show: Black Hat USA 2014

    Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
    Read More
  • August 7 2017 | Financial Times

    Companies at Black Hat conference warned on cyber risk disclosure

    Researchers in Las Vegas for the Black Hat cyber security conference exposed flaws they argue could allow hackers to swipe credit card details from more than 600…
    Read More
  • August 7 2014 | BBC

    Airport weapon check ‘can be hacked’

    The BBC's Dave Lee was in Las Vegas at the Black Hat security conference to find out whether hackers are putting safe air travel at risk.
    Read More
  • August 7 2014 | Sky News

    Hacking Expert 'Took Control Of 200 Hotel Rooms'

    Speaking at the Black Hat hacking conference in Las Vegas, he said: "I thought about looking to see if a similar system controlled the door locks but got scared."
    Read More
  • August 7 2014 | The Register

    Cracker takes control of 200 rooms in Chinese hotel

    Jesus Molina, a former chair of the Trusted Computing Group and independent security consultant, was staying in the hotel and started playing around with the in-room iPad which was used to control the lights and blinds. Each room has its own iPad and Molina started thinking about how the system worked.
    Read More
  • August 7 2014 | BBC

    Airport weapon check 'can be hacked'

    Billy Rios, from Qualys, says that there are fundamental weaknesses relating to being able easily to discover administrator passwords to some equipment.
    Read More
  • August 7 2014 | golem.de

    Control the light of the neighbors

    At the Black Hat conference security researchers reported Jesus Molina about his experience with the technique of a hotel in Shenzhen, China.
    Read More
  • August 7 2014 | golem.de

    Expert advises U.S. government to buy all vulnerabilities

    The security expert Dan Geer makes radical proposals, such as politics and business for greater safety can ensure the network. His personal action: retreat.
    Read More
  • August 7 2017 | Gigaom

    Security flaw affects nearly every Android phone with a Qualcomm Snapdragon chip, researcher warns

    At the Black Hat conference in Las Vegas this week, computer security researcherDan Rosenberg unveiled a previously unpublished security flaw that could be used to permanently unlock the bootloader on Android phones. Demonstrated on a Motorola Moto X on Wednesday, the exploit affects almost any device using a modern Qualcomm Snapdragon chip.
    Read More
  • August 7 2014 | golem.de

    Control the light of the neighbors

    In a hotel in China, light and TV using an iPad could control. After a brief analysis of the system noted the security researchers Jesus Molina that he could control the devices in all other rooms without much effort.
    Read More
  • August 7 2014 | SC Magazine

    Black Hat: Hidden controls open 2 billion mobile devices to exploitation

    Hidden controls found in a wide array of devices — from smartphones and laptops to embedded M2M devices and some cars — could be leveraged by attackers for widescale cellular exploitation, researchers from Accuvant Labs told a packed house Wednesday at the 2014 Black Hat conference in Las Vegas.
    Read More
  • August 7 2014 | The Independent

    Hackers blasted AC/DC through Iranian computers as they disabled nuclear power plant

    Although Stuxnet itself was discovered way back in June 2010, this detail only emerged this week at the Black Hat hackers’ conference in Las Vegas.
    Read More
  • August 7 2014 | IT World

    Carriers' remote control software continues to put some mobile devices at risk

    While the two researchers spoke about the issues last week, on Wednesday they released details about the specific vulnerabilities they identified during a presentation at the Black Hat security conference in Las Vegas.
    Read More
  • August 7 2014 | VentureBeat

    Yahoo rolls out new encryption for email – but not until the fall

    And today at the Black Hat security conference here in Las Vegas (where mid-day temperatures were hovering at a respectable 98 degrees in the shade), Yahoo’s new security researcher and veep of information security, Alex Stamos, officially disclosed that his company intends to roll out end-to-end encryption in its email service in the fall.
    Read More
  • August 7 2014 | VentureBeat

    Hacker claims he controlled appliances in every room of a 5-star hotel

    Molina, a security researcher from San Francisco, described this feat at the Hat security conference in Las Vegas.
    Read More
  • August 7 2014 | CSO

    Salted Hash: Live from Black Hat USA (Day 3)

    Thursday is the day of the week that Hacker Summer Camp takes on some changes. The corporate side of things starts to wind down, and the Black Hat attendees are likely heading to one of two places - DEF CON or home. Salted Hash will remain for DEF CON, so expect more updates over the next few days.
    Read More
  • August 7 2014 | Deep.Dot.Web

    National Cybersecurity Policy – Good or Bad?

    His presence at Black Hat was somewhat precarious given his position at a firm responsible for providing the C.I.A. and other U.S. intelligence agencies with information technology, but the opinions he shared in his speech were his own, something he was diligent to repeat.
    Read More
  • August 6 2014 | golem.de

    Cookie clutter and virtualhost confusion threaten HTTPS

    "The Beast wins again "titled Antoine Delignat-Lavaud his presentation at the Black Hat -. alluding to the BEAST attack The BEAST attack was in 2011discovered and ushered in a whole series of similar attacks a, showed the weaknesses in the TLS protocol.
    Read More
  • August 6 2014 | Help Net Security

    CrowdStrike launches Intelligence Exchange Program

    At Black Hat, CrowdStrike announced the launch of the CrowdStrike Intelligence Exchange Program (CSIX).
    Read More
  • August 6 2014 | Help Net Security

    Detect threat patterns across your web and mobile assets

    During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather threat intelligence on all websites and mobile apps that are legitimately or illegally associated with their business.
    Read More
  • August 6 2014 | golem.de

    Cookie Clutter and virtualhost Confusion threaten HTTPS

    Antoine Delignat-Lavaud presented at Black Hat 2014 several new security problems in HTTPS, based largely on known weaknesses. There are results of a research project that attempts to formalize the security of TLS mathematically.
    Read More
  • August 6 2014 | PC Magazine

    MDM is Terrible: When Security Solutions Hurt Security

    A recent Black Hat demonstration had surprising answers.
    Read More
  • August 6 2014 | SC Magazine

    Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

    At a Black Hat 2014 session, one hacker revealed how he was able to control basic amenities in a luxury hotel – and why the hospitality industry must update its security policies to take into consideration Internet of Things threats.
    Read More
  • August 6 2014 | Ars Technica

    CIA’s venture firm security chief: US should buy zero-days, reveal them

    In a wide-ranging keynote speech at the Black Hat information security conference today, computer security icon Dan Geer gave attendees a sort of personal top 10 list of things that could be done to make the Internet more secure, more resilient, and less of a threat to personal privacy.
    Read More
  • August 6 2014 | TechTarget

    Black Hat 2014: Researcher reveals Amazon cloud security weaknesses

    At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don’t take security seriously.
    Read More
  • August 6 2014 | Computerworld

    Network-attached storage devices more vulnerable than routers, researcher finds

    "There wasn't one device that I literally couldn't take over," Holcomb said Wednesday during a talk at the Black Hat security conference in Las Vegas, where he presented some of his preliminary findings. "At least 50 percent of them can be exploited without authentication," he said.
    Read More
  • August 6 2014 | news.com.au

    Ruben Santamaria to show Black Hat conference how satellite communications systems can be hacked

    Sin City may seem like an unlikely place for a breakthrough in the search for the missing plane, but this week it is hosting the Black Hat conference — an annual IT security talkfest in which experts reveal the holes they have discovered in online systems.
    Read More
  • August 6 2014 | IEEE Spectrum

    Black Hat 2014: Hacking the Smart Car

    He and a colleague have conducted the first industry-wide study of remote hacking possibilities (not actual hacks) for smart cars. The researchers are presenting their work at this week’s Black Hat security conference in Las Vegas.
    Read More
  • August 6 2014 | Mashable

    Hacks, Pranks and Feds: Vegas Is Ready For Black Hat and Def Con

    Even though it is celebrated right before Def Con, Black Hat attracts a largely different crowd, made mostly of large antivirus and computer security companies' employees, as well as big corporations' executives.
    Read More
  • August 6 2014 | VentureBeat

    Oh, great. It’s not that hard to hack TSA’s airport security scanning machines

    Rios made the presentation at the Black Hat security conference today in Las Vegas. Black Hat talks are normally alarming, as security researchers have found it all to easy to poke holes in computer-related devices.
    Read More
  • August 6 2014 | VentureBeat

    Hackers confused Iranian scientist by blaring AC/DC in nuke lab

    During a thoroughly detailed and far ranging talk about hacking and malware propagation at the Black Hat conference attended by 2,000 in a massive conference room at the Mandalay Bay Wednesday, legendary computer security visionary Mikko Hypponen had a funny story to tell.
    Read More
  • August 6 2014 | VentureBeat

    Rule #1 at Black Hat & Defcon: Mobile devices stay in your hotel room

    Rule number one at Black Hat and Defcon is simple: Mobile devices stay in your hotel room.
    Read More
  • August 6 2014 | Examiner

    Top security analyst calls for major industry changes

    Appearing as the opening keynote speaker for the 18th annual Black Cybersecurity conference in Las Vegas, Dan Geerdrew on his decades of computer security experience to outline a series of key changes he feels are necessary to protect the health of the Internet and the burgeoning global industry around it. “Cybersecurity is now a riveting concern, “said Geer. “Policy matters are now the most important matters.”
    Read More
  • August 6 2014 | CSO

    Salted Hash: Live from Black Hat USA (Day 2)

    Today's update begins with research on an unusual form of malware. Contained entirely in the system's registry, this infection works without a file, and was recently seen leveraging Microsoft Word vulnerabilities to spread.
    Read More
  • August 6 2014 | WIRED

    CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them

    Geer, an icon in the world of computer security, delivered his controversial stance during a keynote at the Black Hat security conference in Las Vegas today.
    Read More
  • August 6 2014 | The Register

    Watch this Aussie infosec bod open car doors from afar

    The newly minted director of anti-malware engineering at Qualys was now set to present his research into opening car doors and boots at Black Hat Las Vegas as part of his new field of interest.
    Read More
  • August 6 2014 | CBS

    Black Hat 2014: Security experts hack home alarms, smart cars and more

    As hackers gather in Las Vegas for the Black Hat cybersecurity conference, challenging the security of the Internet of Things seems to be this year's hottest topic.
    Read More
  • August 6 2014 | CNET

    ’Internet of Things,’ not privacy, to dominate at Black Hat

    As many as 13 previously unknown vulnerabilities in home Wi-Fi routers and networked storage systems are set to be disclosed at the Black Hat computer security conference that kicks off in Las Vegas on Wednesday.
    Read More
  • August 6 2014 | SecurityWatch

    Black Hat 2014 by the Numbers

    The annual Black Hat conference in Las Vegas, now in its 17th year is a massive gathering of security-minded individuals. The show moved this year from Caesars Palance to a bigger space in Manadalay Bay Convention Center, giving Black Hat the ability to do more than it was able to in the past, Jeff Moss, founder and director of Black Hat, said during the conference's opening remarks on Wednesday.
    Read More
  • August 6 2014 | eSecurity Planet

    Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote

    Black Hat keynote speaker Dan Geer has some radical ideas to reshape modern security, including a suggestion that the United States purchase security vulnerabilities and make them public.
    Read More
  • August 6 2014 | Fox Business

    Are Cyber Stress Tests the Way of the Future?

    “The 2008 financial crisis proved we can build systems more complex than we can operate,” he said in his keynote address to about 8,000 computer-security experts attending the Black Hat conference in Las Vegas. “We need stress tests in our field.”
    Read More
  • August 6 2014 | TechTarget

    Black Hat 2014

    Dan Geer, who made his name a decade ago by criticizing Microsoft's near monopoly on the desktop to task as an inherent security risk, today kicked off Black Hat 2014 in Las Vegas with a keynote address laying out several provocative suggestions for fundamentally changing the infosec approaches of both governments and the security industry.
    Read More
  • August 6 2014 | SC Magazine

    Black Hat keynote talks cyber policies for field’s future

    On Wednesday morning, Dan Geer, the CISO of Arlington, Va.-based investment firm In-Q-Tel, delivered his keynote at the Black Hat hacking conference in Las Vegas, where he argued that “policy matters are now the most important matters” as it pertains to moving forward as an industry.
    Read More
  • August 6 2014 | eWeek

    Nest Thermostat Security Risk Disclosed at Black Hat

    Among the most well-known Internet of things (IoT) devices in the consumer market is the Nest Learning Thermostat. According to research discussed at the Black Hat USA security conference here, there is also potential security risk with the thermostat that could enable a backdoor attack.
    Read More
  • August 6 2014 | NPR

    Is Your Watch Or Thermostat A Spy? Cybersecurity Firms Are On It

    The other camp is terrified of what that means: everyday objects that can be hacked, easily, to spy on us and hand off valuable data to cybercriminals. The cynics are gathered in Las Vegas this week, at the security conference Black Hat.
    Read More
  • August 6 2014 | eWeek

    Airport Security Not Secure Enough, Researcher Reveals at Black Hat

    The security of a number of devices used by the U.S. Transportation Security Administration (TSA) is being called into question by a researcher at the Black Hat USA conference here.
    Read More
  • August 6 2014 | Dark Reading

    TSA Checkpoint Systems Found Exposed The On Net

    Renowned security researcher Billy Rios, who is director of threat intelligence at Qualys, here today at Black Hat USA gave details on security weaknesses he discovered in both the Morpho Detection Itemiser 3 trace-explosives and residue detection system, and the Kronos 4500 time clock system used by TSA agents to clock in and out with their fingerprints, that could allow an attacker to easily gain user access to the devices.
    Read More
  • August 6 2014 | The Verge

    The TSA’s explosives sniffers have a major security flaw

    Rios is taking the issue public in a talk at Black Hat today, but he's been forcing the issue more quietly for months. He reported the problem to Homeland Security earlier in the year, and the agency has been treating it as a known vulnerability.
    Read More
  • August 6 2014 | Fox Business

    Cybersleuth offers to help cops nab Russian thieves who stole 1.2 billion passwords

    He timed his announcement to coincide with the annual Black Hat USA cybersecurity conference this week in Las Vegas, where it created quite a buzz.
    Read More
  • August 5 2014 | The Telegraph

    Hackers can unlock your car with little more than a laptop

    Silvio Cesare, who works for security firm Qualys, plans to give a talk at the Black Hat security conference in Las Vegas this week describing experiments where he successfully unlocked his own car using a cunning technique.
    Read More
  • August 5 2014 | Help Net Security

    The weak links in an increasingly dynamic threat landscape

    The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations - outdated software, bad code, abandoned digital properties, or user errors - that contribute to the adversary’s ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption protocols, social engineering and “life event” spam.
    Read More
  • August 4 2014 | Yahoo! Finance

    Why you should root for the Black Hat Hackers

    Some of the most anticipated sessions will cover hacking automated control systems in hotel rooms, using Google Glass to steal passwords and reprogramming a Nest thermostat without permission. Another hacker will demonstrate breaking into the passenger wifi systems on aircraft via satellite transmissions.
    Read More
  • August 4 2014 | NPR

    Hacker Says He Can Break Into Airplane Systems Using In-Flight Wi-Fi

    At this year's Black Hat convention, a cybersecurity consultant, Ruben Santamarta, will discuss how he went even further: by showing it's possible to interfere with an airplane's navigation and safety systems — while on the plane and in the air —using the plane's own Wi-Fi and in-flight entertainment systems.
    Read More
  • August 4 2014 | Help Net Security

    New game sharpens secure coding skills

    Today at Black Hat, Checkmarx launched Game of Hacks, a challenging game for software developers and security professionals to test their application hacking skills, improve their code security know-how and facilitate better security practices in hope of reducing the amount of vulnerabilities in their applications.
    Read More
  • August 4 2014 | Reuters

    Hacker says to show passenger jets at risk of cyber attack

    Santamarta, a consultant with cyber security firm IOActive, is scheduled to lay out the technical details of his research at this week's Black Hat hacking conference in Las Vegas, an annual convention where thousands of hackers and security experts meet to discuss emerging cyber threats and improve security measures.
    Read More
  • August 4 2014 | CBS MoneyWatch

    Latest target for hackers – your car

    Australian security researcher Silvio Cesare plans to review his findings about this new approach to keyless break-ins at this week's Black Hat Internet security conference in Las Vegas.
    Read More
  • August 4 2014 | WIRED

    Watch This Wireless Hack Pop a Car’s Locks in Minutes

    As part of a talk on the insecurity of wireless devices at the Black Hat security conference later this week, Cesare plans to reveal a technique that could allow anyone to spoof the signal from a wireless key fob and unlock a car with no physical trace, using a codebreaking attack that takes as little as a few minutes to perform.
    Read More
  • August 1 2014 | Reuters

    Despite warnings, computers still vulnerable to hackers of start-up codes

    That could mean many newer Windows computers remain exposed, the MITRE team told Reuters ahead of a presentation at the Black Hat security conference in Las Vegas next week.
    Read More
  • August 1 2014 | India Today

    Pen drives make it easy for hackers to enter your computer and you can't do anything about it

    Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week's Black Hat hacking conference in Las Vegas, in a presentation titled: "Bad USB - On Accessories that Turn Evil."
    Read More
  • August 1 2014 | redOrbit

    Should You Be Worried About Malicious Things On Your USB Devices?

    Their findings will be presented at the upcoming Black Hat security conference in Las Vegas, under the title: “Bad USB – On Accessories that Turn Evil.”
    Read More
  • August 1 2014 | Wall Street Journal OTC

    Is USB stick safe for your PC? Researchers say no

    The security researchers have planned to present the details of flaw at the Black Hat security conference in Las Vegas next week.
    Read More
  • August 1 2014 | Tom’s Guide

    Don't Panic Over the Latest USB Flaw

    Security researchers Karsten Nohl and Jakob Lell will present their full findings on the software, which they created, next week at the Black Hat USA security conference in Las Vegas.
    Read More
  • August 1 2014 | Solar News

    Hackers can tap USB devices in new attacks

    Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week's Black Hat hacking conference in Las Vegas, in a presentation titled: "Bad USB - On Accessories that Turn Evil."
    Read More
  • August 1 2014 | International Business Times

    USB Drives Contain Undetectable Security Flaw Allowing Hackers Take Control of Your Computers

    Nohl and Lell have prepared a full demonstration of the attack for the Black Hat ethical hackers conference on 7 August in Las Vegas, where they will discuss solutions to how USB can be better secured from malware.
    Read More
  • August 1 2014 | TechWeek Europe

    USB Devices Wide Open To Hack, Warn Researchers

    Both Nohl and Lell will revealed their research at the upcoming Black Hat security conference in Las Vegas. And it seems as though there is no easy fix to the problem, because the flaw exploits the main design principle of all USB plug-and-play devices.
    Read More
  • August 1 2014 | The Daily Caller

    NO ONE IS SAFE: The USB Has Been Hacked

    Nohl and Lell plan to present their findings with reverse engineering and BadUSB at the Black Hat security conference in Las Vegas, which is August 2-7. Until someone finds a way to save the USB system or develop something safer, Nohl said there’s not a whole lot you can do.
    Read More
  • August 1 2014 | IT Pro Portal

    USB sticks or the keys to the kingdom? Hackers turn USBs into security threats

    Nohl isn't just crying wolf. He was responsible for a presentation last year at the Black Hat Conference that highlighted methods that the NSA was using for surveillance.
    Read More
  • August 1 2014 | eWeek

    New Flaws in USB Devices Let Attackers Install Malware: Black Hat

    New research on USB vulnerabilities is set to be revealed at a Black Hat conference presentation.
    Read More
  • August 1 2014 | TechTarget

    Android vulnerability enables app impersonation, heightens BYOD risks

    While the details of how the vulnerability was found have not been released,Forristal will be divulging findings at a presentation at Black Hat later this month.
    Read More
  • August 1 2014 | Computerworld

    PANIC! Stop using USB (it's ''fundamentally broken'') #BadUSB

    That's the stark warning from Security Research Labs, to be given at Black Hat in Lost Wages.
    Read More
  • July 31 2014 | Help Net Security

    Malicious USB device firmware the next big infection vector?

    The two are set to present several demonstrations of these attacks at the upcoming Black Hat security conference, and while it's good to know such attacks are possible, the bad news is that we, as users, can't do much to prevent them apart from stop using USB devices altogether.
    Read More
  • July 31 2014 | WIRED

    Why the Security of USB Is Fundamentally Broken

    The two researchers haven’t yet decided just which of their BadUSB device attacks they’ll release at Black Hat, if any.
    Read More
  • July 31 2014 | Reuters

    Hackers can tap USB devices in new attacks, researcher warns

    Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week's Black Hat hacking conference in Las Vegas, in a presentation titled: "Bad USB - On Accessories that Turn Evil."
    Read More
  • July 31 2014 | PC Magazine

    Researchers Warn About 'BadUSB' Exploit

    The pair will present their findings on Aug. 7 at this year's Black Hat 2014 conference.
    Read More
  • July 31 2014 | Gizmodo

    USB Has a Fundamental Security Flaw That you Can’t Detect

    So it's fairly worrying that the pair of researchers have demonstrated—and will present at the upcoming Black Hat security conference in Las Vegas—that the flaw can be exploited on thumb drives, mice, keyboards and even an Android smartphone.
    Read More
  • July 31 2014 | InformationWeek

    USB Hardware Easily Subverted, Reserachers Claim

    In a coming presentation at Black Hat USA 2014, Karsten Nohl and Jacob Lell plan to demonstrate a proof-of-concept attack on USB devices they're calling BadUSB.
    Read More
  • July 31 2014 | Ars Technica

    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    In a demonstration scheduled at next week's Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers.
    Read More
  • July 31 2014 | TechSpot

    Researchers uncover fundamental USB security flaw, no fix in sight

    The flaw that security researchers Karsten Nohl and Jakob Lell plan to present next week at the Black Hat security conference in Las Vegas runs deeper than simply loading a USB drive with malware.
    Read More
  • July 31 2014 | Hot Hardwar

    Hackers Can Now Compromise USB Devices And On-Board USB Controllers

    Karsten Nohl, chief scientist with SR Labs, has noted that this kind of hack is simple enough where the likes of the National Security Agency might already be taking advantage of it. Both Nohl and Jakoc Lell, a security researcher at SR Labs, will be showing-off their findings at next week's Black Hat conference in Las Vegas.
    Read More
  • July 31 2014 | Tech Times

    USB is the latest favorite hacking tool

    All USB devices, from a USB key to an external keyboard connected through a USB, can be hit and compromised, said researchers Karsten Nohl and Jakob Lell. The two said they will present their proof-of-findings at the Black Hat conference next week.
    Read More
  • July 31 2014 | TechRadar UK

    Uh oh, the humble USB has a serious security problem

    The pair of researchers will be demonstrating their findings at the Black Hat security conference in Las Vegas. But for now, you're best advised to not go sticking your USBs into any computers you don't trust.
    Read More
  • July 31 2014 | Daily Mail UK

    Is your USB drive at risk? 'Invisible yet fundamental' flaw that lets hackers take over computers discovered

    The researchers are due to present their research at the Black Hat security conference in Las Vegas next week.
    Read More
  • July 31 2014 | SC Magazine UK

    Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

    Whilst security purists will dismiss Nohl and Lell's research - which will be fully revealed at the next week's Black Hat event in Las Vegas - on the basis it requires physical access to the computer, the reality is that researchers have proven many times that leaving `spare' high capacity USB sticks in cafes and even in car parks, leads curious users to plug them into a computer in the office to discover the content and re-use the stick for their own purposes.
    Read More
  • July 31 2014 | ZDNet

    BadUSB: Big, bad USB security problems ahead

    It could be worse. USB sticks can also carry malware. Or, as SRLabs security researchers Karsten Nohl and Jakob Lell propose to show at Black Hat, an ordinary USB pen drive can be turned into an automated hacking tool.
    Read More
  • July 31 2014 | BGR

    The scariest USB hack of all-time is almost completely undetectable

    However, Ars Technica reports that researchers at Security Research Labs in Berlin are scheduled to unveil a new exploit at the Black Hat conference in Las Vegas next week that will allow an infected USB stick to take over your computer and use it to execute malicious code.
    Read More
  • July 31 2014 | The Register

    Plug and PREY: Hackers reprogram USB drives to silently infect PCs

    The two, who will present a full technical talk and proof-of-concept code at next week's Black Hat conference in Las Vegas, designed BadUSB to convince the target computer that a USB thumb drive is also a USB keyboard – which quickly feeds a string of characters to the computer as if typed by the user.
    Read More
  • July 31 2014 | itbusiness.ca

    USB drives aren’t secure, researchers say

    They’ll be presenting their findings next week during Black Hat, a security conference in Las Vegas.
    Read More
  • July 30 2014 | Computerworld

    Your Android has a Fake ID problem, allowing malware to impersonate trusted apps

    Forristal will present more technical details and demonstrate the exploit against a live device at Black Hat when Bluebox presents "Android FakeID Vulnerability Walkthrough."
    Read More
  • July 29 2014 | SC Magazine

    Vulnerability impacting multiple versions of Android could enable device takeover

    The vulnerability ultimately “undermines the validity of the [Android] signature system and breaks the PKI fundamental operation,” Jeff Forristal, CTO of Bluebox security, wrote in a Tuesday post, adding he will be getting into the technical details at the upcoming Black Hat 2014 conference.
    Read More
  • July 29 2014 | Business Insider Australia

    There's A Terrifying Android Vulnerability That Could Let Hackers Completely Take Over Your Phone

    One of the researches behind the discovery will be presenting his findings at a ‘Black Hat’ talk.
    Read More
  • July 29 2014 | Threatpost

    Critical Android FakeID Bug Allows Attackers To Impersonate Trusted Apps

    In an interview, Jeff Forristal, CTO of Bluebox, said that there are a number of ways for an attacker to exploit this vulnerability, a bug that he called severe. Forristal will discuss the vulnerability in a presentation at Black Hat in Las Vegas next week.
    Read More
  • July 29 2014 | Phys.Org

    Security CTO to detail Android Fake ID flaw at Black Hat

    Forristal will speak about this next week at the Black Hat Security event in Las Vegas. He said his talk will cover technical details, where he will review the bug, including how it was found, and how it works.
    Read More
  • July 29 2014 | CSO

    A practical survival guide to Black Hat and DEF CON

    Every year, thousands gather in Las Vegas to attend Hacker Summer Camp, or collectively the Black Hat, B-Sides Las Vegas, and DEF CON conferences.
    Read More
  • July 29 2014 | readwrite

    Android’s Most Popular Apps Are Lousy With Bugs, Researchers Find

    The company will reveal the details of its findings—including the compromised Android apps—at the Black Hat USA security conference Aug. 6-7 in Las Vegas.
    Read More
  • July 29 2014 | CSO

    Black Hat 2014: How to crack just about everything

    As the world’s best security experts prepare to descend on Black Hat USA 2014 next month, they must be rubbing their hands in anticipation of colleague’s upcoming revelations about the latest means to crack a range of devices and flaws they’ve found in trusted protocols.
    Read More
  • July 29 2014 | eWeek

    Fake ID Flaw Puts Android Users at Risk

    Forristal plans on providing full details of the Fake ID flaw, identified as Google bug 13678484, in a session at Black Hat USA 2014, which runs Aug. 4-7 in Las Vegas.
    Read More
  • July 24 2014 | WIRED

    How Hackers Hid a Money-Mining Botnet in the Clouds of Amazon and Others

    At the Black Hat conference in Las Vegas next month Ragan and Salazar plan to reveal how they built a botnet using only free trials and freemium accounts on online application-hosting services—the kind coders use for development and testing to avoid having to buy their own servers and storage.
    Read More
  • July 23 2014 | Forbes

    How Your Security System Could Be Hacked To Spy On You

    Lamb plans to present his findings in Las Vegas next month. He’s not the only presenter at the popular back-to-back hacker conferences there, Black Hat and Defcon, who has set his sites on the way security systems can be subverted to make their owners less secure.
    Read More
  • July 23 2014 | WIRED

    How Thieves Can Hack and Disable Your Home Alarm System

    The two researchers plan to present their findings separately next month at the Black Hat security conference in Las Vegas.
    Read More
  • July 22 2014 | Bloomberg

    The Top 10 White-Hat Hacks

    With the annual Black Hat and DefCon hacker conferences in Las Vegas starting up in August, Bloomberg is revisiting some of the biggest showstoppers by some of the white-hat community's most elite stars.
    Read More
  • July 22 2014 | InformationWeek Dark Reading

    7 Black

    At Black Hat, researchers will point out the weaknesses in everything from the satellites in outer space to the thermostat in your home.
    Read More
  • July 22 2014 | Threatpost

    Third-Party Software Library Risks To Be Scrutinized At Black Hat

    Kouns, along with Kymberlee Price, director of ecosystem strategy at Synack and former security program manager at BlackBerry and Microsoft, will present research on the use and risks associated with third party libraries at the upcoming Black Hat USA conference in Las Vegas. Kouns and Price will focus on OpenSSL during their talk, but will also identify some of the other less high-profile libraries such as libpng, freetype and ffmpeg, that are most putting application security at risk.
    Read More
  • July 22 2014 | WIRED

    Hackers Could Take Control of Your Car. This Device Can Stop Them

    At the Black Hat security conference in Las Vegas next month, they’ll unveil a prototype device designed to foil the same unnerving tricks they’ve demonstrated: An intrusion-detection system for automobiles.
    Read More
  • July 21 2014 | eWeek

    Daily Tech Briefing: July 21, 2014

    Black Hat preview shows hotels and IoT vulnerable to hacks; HP grows efforts to target IBM and Lenovo server customers; and more news.
    Read More
  • July 21 2014 | SecurityWeek

    PoS Security Challenges in the Spotlight at Upcoming Black Hat Conference

    At the upcoming Black Hat USA conference in Las Vegas, Lucas Zaichkowsky, enterprise defense architect at AccessData, plans to spotlight the challenges around protecting the PoS architecture and discuss how businesses big and small can bolster their defenses.
    Read More
  • July 20 2014 | eWeek

    Black Hat Preview Shows Hotels, IoT Vulnerable to Hacks

    During a session at the upcoming Black Hat security conference that starts Aug. 5 in Las Vegas, independent security consultant Jesus Molina is set to expose the risks of hotel automation systems.
    Read More
  • July 18 2014 | InformationWeek Dark Reading

    Hacking Your Hotel Room

    At Black Hat USA next month, a researcher will show how to hack your way into controlling everything in a hotel room -- from lighting to television sets.
    Read More
  • July 18 2014 | recombu

    Chromecast Rickroll Hack: your living room is safe

    Rickmote creator Dan Petro says he'll release a step by step video telling you exactly how to create your own Rickmote after the BlackHat Tools Arsenal USA conference on August 6.
    Read More
  • July 18 2014 | Gizmodo

    It’s Alarmingly Easy for Hackers to Control Your Hotel Room

    Molina will be presenting his findings at the Black Hat security conference in August, so there's hope that hotels with similar vulnerabilities will pony up and fix the problems.
    Read More
  • July 17 2014 | BGR

    Hackers target Nest as a warning to Google about data-sharing

    The hackers want to release this Nest jailbreak solution to interested owners that want to prevent Google from getting more updates about their home, after introducing it at the Black Hat conference in Las Vegas in early August.
    Read More
  • July 17 2014 | PCWorld

    Rick-rolling ‘Rickmote’ shows no mercy when it finds someone using Chromecast

    He is due to present more details on the tool on Friday at the Hope X conference in New York and at the Black Hat security conference on Aug. 6.
    Read More
  • July 17 2014 | International Digital Times

    New Google Chromecast Hack Takes Rickrolling To A Whole ‘Nother Level: Check Out Dan OPetro’s Fabulous ‘RickMote’

    In addition, Petro shares a plan to release a step-by-step guide for creating a RickMote Controller out of a Raspberry Pi. The release will likely come in a couple of weeks a Black Hat Tool USA on August 6, 2014 in Las Vegas.
    Read More
  • July 17 2014 | WIRED

    Here’s How Easy It Could Be for Hackers to Control Your Hotel Room

    He’ll be presenting his findings at the Black Hat security conference in August.
    Read More
  • July 16 2014 | Forbes

    Nest Hackers Will Offer Tool To Keep The Google-Owned Company From Getting Users' Data

    They plan to present their Nest teardown at August security conference Black Hat – Nest Thermostat: A Smart Spy In Your Home — and have also uploaded a video to YouTube of UCF student Grant Hernandez doing a “hack unboxing.”
    Read More
  • July 16 2014 | eWeek

    Researchers Track Spread of Security Flaws in Software Libraries

    The two security professionals will present their analysis of popular software components—including LibPNG, used by more than 130 popular software products, and FreeType, used in more than 30 applications—during the Black Hat Security Briefings August 2-7 in Las Vegas.
    Read More
  • July 15 2014 | InformationWeek Dark Reading

    Tapping Into A Homemade Android Army

    However, at Black Hat USA next month Drake plans to help the security community save time and focus on finding bugs and reaching other important security conclusions by building what he terms a homemade "Android Army."
    Read More
  • July 14 2014 | Network World

    The Black Hat Quiz

    Black Hat draws the elite of the security world to one place and has earned a reputation for introducing shocking new security exploits, takeovers of seemingly secure gear, means of recruiting botnets and ways to steal identities.
    Read More
  • July 10 2014 | ZDNet

    Nest, Tor and more: Hot talks, cool hacks at Black Hat USA 2014

    Black Hat USA returns for its 17th year to Las Vegas, with four days of trainings and two packed days of talks from August 2-7. It will be the conference's first time in a new location, the Mandalay Bay Hotel and Casino.
    Read More
  • July 10 2014 | Computerworld

    Protecting email at a hacker conference

    The upcoming hacker conferences, HOPE, Black Hat and DEFCON make this a good time to think about email security.
    Read More
  • July 8 2014 | IT PRO

    Google Glass wearers can steal your passwords with new software

    There’s another nefarious use for Google Glass, with software allowing users to steal your device passcodes.
    Read More
  • July 8 2014 | Yahoo! News UK & Ireland

    Google Glass wearers can steal your password from 10ft away

    Fu and his colleagues will reveal more details of their research at the Black Hat hacker conference in Las Vegas this year - and show off a Privacy Enhancing Keyboard application for Android devices, which pops up a randomized keyboard whenever a password is required, but reverts to a normal QWERTY keyboard when not in use.
    Read More
  • July 7 2014 | CNN Money

    Google Glass wearers can steal your password

    The research will be presented next month at the Black Hat cybersecurity conference.
    Read More
  • July 7 2014 | InformationWeek Dark Reading

    Black Hat USA 2014: Third-Party Vulns Spread

    Two researchers at Black Hat next month plan to present data that shows how the spread of attack surface from something like a Heartbleed vulnerability instance looks very similar to an epidemiological event, like a widespread flu outbreak.
    Read More
  • July 6 2014 | Round News

    Hackers Who Claim They Can Break Tor Will Give Demo At Black Hat 2014

    During the BlackHat USA 2014 convention the pair, software vulnerability analyst Michael McCord and research scientist Alexander Volynkin, will discuss about possible limitations of the attacks they will describe.
    Read More
  • July 2 2014 | The Register

    Redmond’s EMET defense tool disabled by exploit torpedo

    The researchers were working on disarming version 5 and would reveal details at Black Hat Las Vegas next month.
    Read More
  • July 2 2014 | InformationWeek Dark Reading

    Researcher Finds Flaws In Key Oracle Security Feature

    Famed security researcher and Oracle database expert David Litchfield next month at Black Hat USA will present details of weaknesses he discovered in a widely touted new security feature in Oracle databases.
    Read More
  • July 1 2014 | InformationWeek Dark Reading

    Dark Reading Radio: Oracle

    Litchfield -- a security researcher with Datacom TSS as well as an avid shark diver who swears most sharks are safe to dive with -- will present his findings at the upcoming Black Hat USA conference in August.
    Read More
  • June 30 2014 | Bloomberg

    Female Cyber Sleuths Hack Into Silicon Valley’s Boys Club

    Female attendees at security conferences have also risen to hundreds or more at key events like Black Hat and DefCon, from nearly none 15 years ago, according to organizers of the events.
    Read More
  • June 30 2014 | Network World

    10 disturbing attacks at Black Hat USA 2014

    “Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets…”
    Read More
  • June 30 2014 | Security Week

    Researcher Discusses Hacking the Wireless World With Software-Defined Radio

    Abusing that pager system is just one example of what security researcher Balint Seeber plans to touch on at his upcoming presentation at Black Hat USA.
    Read More
  • June 27 2014 | Infosecurity Magazine

    Long Distance Glasshole Snoopers Can Spot User PINs

    After presenting their findings at Black Hat in August, they’re apparently set to release a Privacy Enhancing Keyboard (PEK) app to Google Play, which will randomize the layout of a phone/tablet lockscreen keyboard – rendering the algorithm virtually useless.
    Read More
  • June 27 2014 | Tom’s Guide

    How to Hack a Hotel Room

    A real hotel hack was accomplished at the St. Regis in Shenzhen, China, by independent security researcher Jesus Molina, who will be presenting his work at the Black Hat security conference in Las Vegas this August.
    Read More
  • June 26 2014 | SC Magazine

    Black Hat organizers announce Dan Geer as keynote

    On Thursday, Black Hat organizers announced that Dan Geer, the CISO at In-Q-Tel, would keynote the 2014 hacking conference in Las Vegas.
    Read More
  • June 26 2014 | The Register

    Freeze, Glasshole! Stop spying on me at the ATM

    The UMass team, led by Dr. Xinwen Fu, an associate professor, is due to present findings from its research during the Black Hat security conference in Las Vegas in August.
    Read More
  • June 25 2014 | Geek

    Researchers can steal an iPad PIN with Google Glass or a smartwatch

    They will be demoing the technique at Black Hat and releasing an Android app that provides a randomized keypad for entering PIN codes.
    Read More
  • June 25 2014 | Engadget

    Researchers crack iPad PINs by tracking the fingers that enter them

    Understanding that some might be genuinely worried about this kind of carry on, the same researchers are currently developing an Android app that randomizes the layout of the PIN-entry keypad, which they plan to release at the same time they present their work at the Black Hat USA conference in August.
    Read More
  • June 25 2014 | Huffington Post UK

    Google Glass Can See Recognise Your Pin From 10m Away

    Xinwen Fu, professor of computer sciences at the University led the project and plans to present the teams startling findings at the Black Hat security conference in August.
    Read More
  • June 24 2014 | International Business Times

    PanGu iOS 7.1.1 Untethered Jailbreak Burns Through Two Potential Exploits For An iOS 8 Jailbreak

    Famed iOS hacker iH8sn0w took to his Twitter page on Monday to confirm that the new PanGu iOS 7.1.1 jailbreak tool was created using two key exploits that are related to code signing and the kernel, and the “syslogd chown” vulnerability, which was disclosed at the Black Hat hacking conference in Las Vegas in August.
    Read More
  • June 24 2014 | WIRED

    Google Glass Snoopers Can Steal Your Passcode With a Glance

    “I think of this as a kind of alert about Google Glass, smartwatches, all these devices,” says Xinwen Fu, a computer science professor at UMass Lowell who plans to present the findings with his students at the Black Hat security conference in August.
    Read More
  • June 24 2014 | Daily Mail UK

    How Google Glass could steal your PIN with just a glance: Video analysis app can work out security codes from ten feet away

    The research team led by Professor Xinwen Fu of the University of Massachusetts Lowell are set to show off their software at the Blackhat hackers conference.
    Read More
  • June 24 2014 | Gizmodo

    It’s Freakishly Easy To Steal Phone PINs With Google Glass

    They plan to release it after they give a Black Hat talk on their research.
    Read More
  • June 19 2014 | Atlanta Business Chronicle

    Georgia Tech researchers ID Android vulnerability

    The Georgia Tech researchers will present their findings at Black Hat USA 2014, August 6-7 in Las Vegas.
    Read More
  • June 13 2014 | InformationWeek Dark Reading

    VDI Under The Security Microscope

    Black Hat USA researchers explore security risks with virtual desktop infrastructure with BYOD.
    Read More
  • June 12 2014 | CSO

    Black Hat scholarships

    This year Black Hat is rolling out a student scholarship program.
    Read More
  • June 12 2014 | Wall St. Cheat Sheet

    5 Smarthome Devices That Have Been Hacked

    Luckily, there are companies looking out for consumers. Various security conventions, like Def Con and Black Hat, have allowed researchers to test and expose flaws within smarthome systems and devices.
    Read More
  • June 5 2014 | InformationWeek Dark Reading

    How Researchers Helped Cripple CryptoLocker

    James says he knows what CryptoLocker's backend infrastructure looks like, and he plans to provide more detail on that in his Black Hat talk.
    Read More
  • June 5 2014 | Motherboard

    Tapped: All the Ways Your Phone Can Be Hacked

    Since the filming of Solnik’s hack, he’s been preparing to reveal some groundbreaking new research at this year’s Black Hat conference, which he claims shows flaws that could allow a malicious actor to remotely hack and control over 2 billion cellular devices worldwide.
    Read More
  • June 3 2014 | InformationWeek Dark Reading

    Dark Reading Radio: Pay Up Or Never See Your Data Again

    He will provide a peek at his upcoming presentation for Black Hat USA on new research and developments in near-time tracking of the ransomware operation's infrastructure.
    Read More
  • June 2 2014 | CNN

    Your car is a giant computer – and it can be hacked

    The company even has forward-thinking plans this year to visit the world's largest hacker conference, Black Hat.
    Read More
  • June 1 2014 | The Sydney Morning Herald

    'White hat' Jonathan Brossard warns cars can be hacked on the road

    The murky world of hacking gets a public airing each year at the Black Hat computer security conference in Las Vegas.
    Read More
  • May 29 2014 | Motherboard

    We Drove a Car While It Was Being Hacked

    We were invited to Black Hat Singapore to show our last research the CHT device.
    Read More
  • March 31 2014 | The Security Ledger

    Web to Wheels: Tesla Password Insecurity Exposes Cars, Drivers

    Now Dhanjani is in the news again with research on one of the most high-profile connected devices in the world: Tesla’s super-smart electric cars. In a presentation at Black Hat Asia on Friday, he released findings of some research on the Tesla Model S that suggests the cars have a weakness common to many Web based applications: a weak authentication scheme.
    Read More
  • March 30 2014 | The Register

    Google researcher says government hack attacks on journos on the rise

    According to Reuters, Huntley told the Singapore Black Hat conference on March 28 that his research, conducted in partnership with Citizen Labs' Morgan Marquis-Boire, revealed attacks on 21 out of the world's top 25 news organisations.
    Read More
  • March 28 2014 | BBC

    Data-stealing Snoopy drone unveiled at Black Hat

    Security firm SensePost has unveiled its Snoopy drone, which can steal data from unsuspecting smartphone users, at the Black Hat security conference in Singapore.
    Read More
  • March 28 2014 | Reuters

    UPDATE 1-Access to Tesla cars only a password away, researcher says

    "We cannot be protecting our cars in the way we protected our (computer) workstations, and failed," he said during a presentation at the Black Hat Asia security conference in Singapore.
    Read More
  • March 28 2014 | Reuters

    Journalists, media under attack from hackers: Google researchers

    The attacks were launched by hackers either working for or in support of a government, and were specifically targeting journalists, Huntley and co-author Morgan Marquis-Boire said in interviews. Their paper was presented at a Black Hat hackers conference in Singapore on Friday.
    Read More
  • March 28 2014 | The Guardian

    Google: 80% of news organisations are targeted by state hackers

    Presented at the ongoing Black Hat Asia 2014 conference in Singapore, Shane Huntley and Morgan Marquis-Boire's research shows that journalists are "massively over-represented" among the targets of state-sponsored hackers.
    Read More
  • March 28 2014 | Motherboard

    Dear Journalists: Everyone Is Spying On You


    The paper, which found that 21 of the world’s top 25 news organizations had been targeted, was presented at a Black Hat hackers conference in Singapore. Read More
  • March 28 2014 | The Independent

    State-sponsored hacking is the biggest threat to news organisations, says Google researchers

    Shane Huntley and Morgan Marquis -Boire presented their research at a Black Hat hacker conference in Singapore on Friday, saying that Google actively “tracks the state actors that attack [it’s] users”.
    Read More
  • March 28 2014 | CNET

    Watch out, journalists: Hackers are after you

    Speaking on Friday at the Black Hat hackers conference in Singapore, Google security engineers Shane Huntley and Morgan Marquis-Boire reported that 21 of the top-25 news organizations in the world have been targeted by hackers.
    Read More
  • March 28 2014 | Ars Technica

    Journalists increasingly under fire from hackers, Google researchers show

    Reuters reported on the duo's findings, which were presented on Friday at the Black Hat Asia security conference in Singapore.
    Read More
  • March 28 2014 | Digital Trends

    Google Researchers Say Hacking Attacks On Journalists Are Likely State-Backed

    Shane Huntley, who released the report at a Black Hat conference in Singapore this week with co-author Morgan Marquis-Boire, says that journalists were “massively over-represented” in the overall pool of people who were victims of such attacks.
    Read More
  • March 28 2014 | SC Magazine UK

    Media industry targeted by state-sponsored cyber attacks

    Google engineers Shane Huntley and Morgan Marquis-Boire presented their findings at the Black Hat hackers conference in Singapore today, and told press reporters that while internet users face phishing and spear phishing attacks to steal data on a regular basis, journalists are “massively over represented” as far as targets go.
    Read More
  • March 28 2014 | SC Magazine US

    Google researchers shed light on state-sponsored attacks targeting news orgs

    At the Black Hat hacking conference in Singapore, security engineers at Google pointed out the high incidence with which state-sponsored attacks targeted major news organizations.
    Read More
  • March 28 2014 | Forbes

    How Your Landlord Can Open Your Company To Hackers - And How To Prevent It

    I’m on a plane coming home from Black Hat Asia, where I attended an excellent session presented by Billy Rios of Qualys, titled “Owning a Building.”
    Read More
  • March 26 2014 | ComputerWorld

    Flying spy: Snoopy drone helps hackers steal data from your phone

    At Black Hat Asia in Singapore, SensePost researcher Glenn Wilkinson will raise awareness of mobile device vulnerabilities with a presentation titled “The Machines That Betrayed Their Masters.”
    Read More
  • March 26 2014 | The Kenya Standard

    ’Snoopy’ drone which can hack into your phone an steal all your data

    Sense point will be presenting their findings at a Black Hat Asia cybersecurity conference this week in Singapore.
    Read More
  • March 26 2014 | Ars Technica

    Meet Snoopy: The DIY drone that tracks your devices just about anywhere

    Wilkinson and SensePost COO Daniel Cuthbert are scheduled to demo the new and improved Snoopy on Friday at the Black Hat 2014 security conference in Singapore.
    Read More
  • March 26 2014 | InfoSecurity Magazine

    Snoopy: A Non-NSA Flying Stingray

    Now the researchers are solving this by mounting their static drone on the other type of flying quadcopter drone, and presenting details at this week's Black Hat Asia.
    Read More
  • March 25 2014 | SC Magazine

    Researchers demo drone that intercepts smartphone data

    Researchers at Sensepost Research Labs, who developed the hacking drone, will be sharing their research at the Black Hat conference in Singapore next week in hopes of shedding light on vulnerabilities within mobile devices.
    Read More
  • March 24 2014| Irish Examiner

    ’Snoopy drone steals data as you’re on street

    The research will be presented at the Black Hat Asia cybersecurity conference in Singapore this week.
    Read More
  • March 21 2014 | The Daily Mail

    Now drones are being used to expose bank details and passwords: Hackers manage to access 150 phones an hour through Wi-Fi

    The test was conducted in London and the group will share their findings at the Black Hat Asia cybersecurity conference in Singapore next week, CNN reported.
    Read More
  • March 21 2014 | International Business Times

    Flying Drone Can Monitor Smartphones From the Air, so Turn Your Wi-Fi Off

    Sensepost will be presenting their research at the Black Hat Asia cybersecurity conference in Singapore next week.
    Read More
  • March 21 2014 | The Voice of Russia

    UK drones can hack smartphones users’ private data

    Researchers in London have been experimenting with the drones and plan to present it at the Black Hat Asia cybersecurity conference in Singapore in about a week from now.
    Read More
  • March 21 2014 | SC Magazine UK

    Flying drone steals smartphone

    Wilkinson and Cuthbert are demonstrating Snoopy at the Black Hat Asia cyber security conference in Singapore on 25-28 March.
    Read More
  • March 21 2014 | International Science Times

    ’Snoopy’ Hacker Drone Steals Smartphone Data By Spoofing WiFi Networks

    The silver lining to all of this is that by presenting their findings at Black Hat Asia conference next week, Sensepost is actually trying to help improve cellphone and WiFi security.
    Read More
  • March 20 2014 | Think Progress

    New Drone Can Hack Into Your Smartphone To Steal Usernames and Passwords

    London researchers have been testing the drone and plan to debut it at the Black Hat Asia cybersecurity conference in Singapore next week.
    Read More
  • March 20 2014 | Gizmodo

    Scary New Drone Can Hack Your Phone From the Air

    SensePost did the drone project in the name of better security and are presenting their findings at the Black Hat Asia conference next week in Singapore.
    Read More
  • March 20 2014 | Digital Trends

    Is It A Bird? Is It A Plane? Nope – It’s A Drone Stealing Your Identity

    Wilkinson and Cuthbert are set to show off Snoopy at the Black Hat Asia cybersecurity conference next week – meaning this technology isn’t exactly widespread, or much of a threat right now.
    Read More
  • March 20 2014 | Slash Gear

    Snoopy drone pilfers smartphone data

    At the Black Hat Asia conference in Singapore next week, the folks behind a drone called Snoopy will showcase how they can intercept data from smartphones using their flying craft.
    Read More
  • May 15 2014 | Network World

    Hacking hotels, shells, cellphones, cars and more mischief coming to Black Hat

    Black Hat USA posted an impressive "first batch" of briefings that will be presented at the Mandalay Bay Convention Center in Las Vegas on August 6 and 7.
    Read More
  • March 20 2014 | CNN Money

    This Drone Can Steal What’s On Your Phone

    The research will be presented next week at the Black Hat Asia cybersecurity conference in Singapore
    Read More
  • March 20 2014 | BetaBeat

    New Drones Can Steal Information Straight From Your Smartphone

    It’s being tested in London, and research on the drones’ functionality will be presented at the Black Hat Asia cybersecurity conference in Singapore next week.
    Read More
  • March 20 2014 | Daily Caller

    Hackers Build Drone That Steals TONS of Sensitive Smartphone Data

    Wilkinson and Daniel Cuthbert, both of the London-based SensePost information security company built Snoopy and plan to present their findings at the Black Hat Asia cybersecurity conference in Singapore beginning March 25.
    Read More
  • February 10 2014 | Business Insider

    Hackers Can Take Over a Car for About $20

    The two are planning on presenting their findings at the Black Hat Asia security conference in Singapore.
    Read More
  • February 10 2014| InfoSecurity Magazine

    Hacking a Car with a $20 Gadget

    Spanish security researchers Javier Vazquez-Vidal and Alberto Garcia Illera are prepping a presentation for the upcoming Black Hat Asia security conference in Singapore that shows off a prototype of a physical device that can give nefarious types a way to gain control of automobiles’ internal computers in order to essentially wreak havoc.
    Read More
  • February 8 2014 | The Daily Caller

    This iPhone-Sized Device Can Hack A Car in Five Minutes

    Javier Vazquez-Vidal and Alberto Garcia Illera from Spain plan to debut their device at the Black Hat Asia security conference in Singapore in March, and expose just how weak the cybersecurity is on manufacturer’s increasingly digitized automobiles.
    Read More
  • February 7 2014| iMotor Times

    Car Hack Device: Deadly iPhone-Sized $20 Tool Can Take Over Any Car, Shocks Auto Industry

    The gadget was first unveiled at last year's Black Hat conference in Las Vegas.
    Read More
  • February 7 2013 | Tech Times

    Hack a Car? Easy as 1-2-3 and Very Cheap: Researchers

    Spanish security researchers Javier Vazquez-Vidal and Alberto Garcia Illera plan to present a tiny gadget at the Black Hat Asia security conference in Singapore in March this year, which they claim can hack a vehicle.
    Read More
  • February 6 2013 | Daily Mail

    The Gadget That Can Hack Any CAR: Terrifying £12 tool can remotely control headlights, locks, steering and even brakes

    It was previously showcased at last year's Black Hat conference in Las Vegas, and now the developers plan to demonstrate the device during the Singapore version of the event in March.
    Read More
  • February 6 2013| Engadget

    Your Car’s Computer System Can Be Hacked With Off-The-Shelf Parts

    In preparation for next month's Black Hat Asia security conference in Singapore, Javier Vazquez-Vidal and Alberto Garcia Illera have assembled a small electronic device that can leave a vehicle's computer system open to attack.
    Read More
  • February 6 2013| SlashGear

    Security Researchers Hack Car Computers With Common Parts

    The duo says that they want their demo at Black Hat Asia to get automakers attention and will keep the source code for the tool private for now.
    Read More
  • February 6 2014 | The Register

    Want to Remotely Control a Car? $20 in Parts, Some Oily Fingers, and You’re in Command

    The device, which will be shown off at next month's Black Hat Asia hacking conference, uses the Controller Area Network (CAN) ports car manufacturers build into their engines for computer-system checks.
    Read More
  • February 6 2014 | Auto World News

    This $20 Palm-Sized Device Can Hack Your Car

    Javier Vazquez Vidal and Alberto Garcia Illera plan to showcase the device at the Black Hat Asia security conference in Singapore next month, Forbes reported.
    Read More
  • February 6 2014 | DailyTech

    Hand-Sized Device Can Hack Cars Remotely, Researchers Call for Greater Security

    Security researchers Javier Vazquez-Vidal and Alberto Garcia Illera plan to show a new device they've built at the Black Hat Asia security conference in Singapore next month -- and they're hoping it will be a wake-up call for the auto industry.
    Read More
  • February 6 2013| SC Magazine UK

    Wirelessly Hack Your Enemy’s Car for Under £15

    The smartphone-sized unit, which researchers Alberto Garcia Illera and Javier Vazquez-Vidal will be showing off at next month's Black Hat Asia event in Singapore, requires physical access to the vehicle in order compromise the car's computer systems.
    Read More
  • February 5 2014| Forbes

    This iPhone-Sized Device Can Hack A Car, Researchers Plan to Demonstrate

    At the Black Hat Asia security conference in Singapore next month, Spanish security researchers Javier Vazquez-Vidal and Alberto Garcia Illera plan to present a small gadget they built for less than $20 that can be physically connected to a car’s internal network to inject malicious commands affecting everything from its windows and headlights to its steering and brakes.
    Read More
  • December 5 2013| Government Computer News

    NTRU Crypto Software Available to Open-Source Community

    But at the 2013 Black Hat conference, according to SI, researchers declared that the math for cracking encryption algorithms could soon become so efficient that it would render the RSA crypto algorithm obsolete.
    Read More
  • December 2 2013 | TechWeek Europe

    Do You Need RFID Protection For Your Physical Wallet?

    At the Black Hat USA security event this past summer, there was an interesting presentation on RFID hacking that demonstrated how easily it is to exploit RFID-enabled cards.
    Read More
  • December 2 2013 | PC Pro

    Internet of Things: Five Unlikely Hacking Risks

    Infamous security researcher Barnaby Jack - who sadly died before he could demo his findings at the Black Hat conference - documented methods whereby he could remotely send an 830-volt shock to a certain pacemaker model from a distance of up to 50 feet away, enough to kill the user.
    Read More
  • November 27 2013 | Financial Times

    Hackers Set Their Sights on the ‘Internet of Things’

    Leading figures from all areas of the information sector met recently at the annual Black Hat conference in Las Vegas.
    Read More
  • November 27 2013| Business Insider

    How to Defend Yourself Against Hacking On Any Device

    Just after the annual Black Hat Internet security convention a few months ago in Las Vegas, I asked a group of my friends – a Navy engineer, a professional hacker, and a hobbyist – to help me come up with a quick list of devices that will be vulnerable during the next few years as the Internet of Things becomes widespread.
    Read More
  • November 27 2013 | The Telegraph

    The Internet Mystery That’s Baffled the World: Is Cicada 3301 a Puzzle, a Treasure Hunt or Some Nefarious Recruitment Test?

    As a regular speaker at Black Hat Briefings – the secretive computer security conferences where government agencies and corporations get advice from hackers – he knows certain organizations occasionally go “fishing” for new recruits like this.
    Read More
  • November 26 2013 | Venture Beat

    Senators Want to Stop Giving the NSA a Big Ol’ ‘Stamp of Approval’ to Spay on Anyone

    NSA chief Keith Alexander spoke at security conference Black Hat this year to say just the opposite.
    Read More
  • November 25 2013 | eWEEK

    Carna Botnet Exploit Unmasked, Researcher Reveals Details

    Parth Shukla, information security analyst in the Operations Centre at the Australian Computer Emergency Response Team (AusCert) is set to publicly discuss the previously unknown Internet Census findings this week at the Black Hat Regional Summit in Sao Paulo, Brazil.
    Read More
  • November 25 2013 | The Houstonian

    LG Smart TV Always Watching, Collecting Surveillance Information

    In Lee’s Black Hat presentation, dubbed “Hacking, Surveilling, and Deceiving Victims on Smart TV,” he discussed how he was able to spy on users from their Smart TV’s even when it was turned off.
    Read More
  • November 22 2013 | Tom’s Guide

    What is a Zero Day Exploit?

    Many of these companies also sponsor security briefing and hacking conferences – such as Black Hat, DEFCON and Pwn2Own – at which researchers meet to discuss current security strategies and find security flaws in popular software.
    Read More
  • November 19 2013 | Computer World

    Perspective: Curbing Data Use is Key To Reining in NSA

    In a keynote address at the Black Hat security conference in July, Alexander insisted that the agency does not routinely listen in on phone calls, monitor email content or collect personal data of U.S. or foreign citizens.
    Read More
  • November 19 2013 | NetworkWorld

    LG Smart TV Spying, Owner Claims His USB Filenames Posted On LG Servers

    He gave a similar warning during his Black Hat presentation, that Smart TVs are the ‘perfect target’ for spying on you.
    Read More
  • November 19 2013 | CSO

    Ten Tweets with Black Hat’s Trey Ford

    Trey Ford, General Manager of Black Hat, tells us how the organization is evolving, how the NSA surveillance revelations have been GOOD for infosec, and explains his love of flying, all in 140 characters or less.
    Read More
  • November 15 2013| InformationWeek

    The Troubling Decline of IT Security Training

    While the online dimension is certainly a viable option in the interim for those professionals serious about increasing their knowledge, anyone who has attended the RSA Conference, Black Hat or the (ISC)2 Security Congress knows that the element of human interaction greatly enhances one’s educational experience.
    Read More
  • November 14 2013| Dark Reading

    What The Carna Botnet Also Found

    Researcher at Black Hat Brazil to present new data and analysis of the controversial Internet Census project
    Read More
  • November 13 2013 | ReadWrite

    Hacking the Connected Home: When Your House Watches You

    He and colleague Josh Yavor spoke at this year’s Black Hat Security Conference in Las Vegas, regaling audiences of their successful hack into a Samsung smart TV.
    Read More
  • November 12 2013 | Fierce Mobile IT

    Attackers Circumvent Security Through App Store, Hardware

    In July 2013, Georgia Tech researchers demonstrated at the Black Hat Security Briefings how a hardware device that looks like a USB charger could compromise a connected iPhone.
    Read More
  • November 8 2013 | Dark Reading

    WhatsApp Security to Be Spotlighted At Black Hat Regional Conference

    At the Black Hat Regional Summit in Brazil later this month, however, one researcher will take the opposite tack and look to add new layers of security to protect users of the WhatsApp messenger service.
    Read More
  • November 8 2013 | Calgary Herald

    The Internet Will Suck Up All Of Your Secrets – If It Hasn’t Already

    At the Black Hat USA 2013 conference, Patrick Reidy, the FBI’s Chief Information Security Officer, said he gets several emails each day from vendors seeking to “Snowden-proof” his network by hardening it against hacker attacks.
    Read More
  • November 1 2013 | InformationWeek

    Researchers Sharpen Spear-Phishing With New Tool Leveraging Social Networks

    But just like its homophonic counterpart, phishing can always be made easier with the right bait. At the upcoming Black Hat Regional Summit in Brazil, Trustwave researchers Joaquim Espinhara and Ulisses Albuquerque plan to do exactly that. br /> Read More
  • November 1 2013 | TechTarget

    Time for a Closer Look at Software Security

    After two years of research and solid hands-on collaborative work with networking, security and audit practitioners worldwide, Hoff delivered a landmark presentation on the issues surrounding virtualization security at the Black Hat conference in 2008 that caught people’s attention.
    Read More
  • October 30 2013 | Computer Dealer News

    Top 5 High Tech Horror Stories for Halloween

    Ethical hacker Barnaby Jack was scheduled to speak at the 2013 Black Hat show in Las Vegas this past July. The buzz around this presentation was enormous.
    Read More
  • October 29 2013 | CIO Insight

    Is the Battle for Network Security a Lost Cause?

    Lieberman’s remarks come from a study his company recently conducted at the Black Hat USA 2013 conference in Las Vegas. The event is held each year to educate attendees on the newest hacking techniques.
    Read More
  • October 28 2013| eWEEK

    Snoopy Snoops on Unsuspecting Users With Wireless Surveillance System

    At the upcoming Black Hat Brazil event in November, researchers from security firm SensePost will debut an updated version of their distributed mobile tracking and analysis projected, dubbed Snoopy.
    Read More
  • October 27 2013 | eWEEK

    Has World War C (Cyber) Already Started?

    At FireEye, Geer has continued his research into the current state of nation-state cyber-attacks and is planning on providing full disclosure about his findings at the Black Hat Brazil event at the end of November
    Read More
  • October 23 2013| Dark Reading

    Malicious Mobile Tracking Made Easy

    Black Hat Sao Paulo speaker discusses Snoopy, a distributed mobile tracking network that can profile users online and in the real world.
    Read More
  • October 22 2013 | TechWeek Europe

    The US Vice President Who Feared A Cyber Heart Attack

    At the Black Hat 2011 conference, a researcher demonstrated how an insulin pump could be hacked and there have been numberous other presentations on medical device flaws in the last few years.
    Read More
  • October 21 2013| ThreatPost

    Snoopy Mobile Tracking, Profiling Project Gets A Boost

    The researchers will present their updates to Snoopy in the next month at Black Hat Sao Paulo in Brazil.
    Read More
  • October 21 2013 | The Guardian

    After General Alexander, Obama should split the NSA to make us all safer

    This year, Alexander attended Black Hat conference (this time, without a hacker costume) and warned of the “terrorist walking among us.”
    Read More
  • October 16 2013 | Venture Beat

    NSA Chief Said to Leave by Spring 2014

    At this year’s Black Hat conference – only weeks after the PRISM reveal – Alexander spoke solemnly, citing how many terrorist attacks the NSA helped prevent using its spy programs (54) and tried to provide evidence as to the care with which it handles data.
    Read More
  • October 15 2013 | CSO

    NSA Director Misled Black Hat Attendees – Claims of PRISM’s Value Overstated

    At the Black Hat security conference, General Alexander told attendees that 54 terror plots were stopped because of records collected under Sections 215 and 702, and of those 13 of them were in the U.S.
    Read More
  • October 14 2013 | InformationWeek

    D-Link Router Vulnerable to Authentication Bypass

    At this past summer’s Black Hat conference in Las Vegas, for example, the researcher highlighted how consumer-grade as well as enterprise-class networked surveillance cameras were vulnerable to zero-day flaws that would allow an attacker to freeze or modify their video streams.
    Read More
  • October 12 2013| Black Hat

    US fears back-door routes into the net because it’s building them too

    At the Black Hat security conference in August last year, for example, a researcher named Jonathan Brossard demonstrated software that can be burned into the hardware of a PC, creating a back door that would allow secret remote access over the Internet.
    Read More
  • Aug 01 2013 | eWeek

    NSA Chief Sought to Balance Security, Privacy in Black Hat Speech

    NSA Director Keith Alexander mixed patriotism, devotion to national security and (one) expletive in his Black Hat keynote defense of the agency’s anti-terrorist mission.
    Read More
  • Aug 01 2013 | TechTarget

    Black Hat 2013 keynote: Alexander details NSA surveillance programs

    Opening the Black Hat 2013 hacker confab with a widely anticipated keynote, Gen. Keith B. Alexander, commander of U.S. Cyber Command and director of the National Security Agency, spoke about two specific NSA surveillance programs.
    Read More
  • Aug 01 2013 | TechTarget

    Black Hat 2013 opens with testy keynote, smart device hacks

    Prior to Wednesday's opening keynote by National Security Agency Director General Keith B. Alexander, Black Hat conference founder Jeff Moss commented that he hadn't seen the sort of tension that now exists in the security community since the "encryption wars" of the early 1990's.
    Read More
  • Aug 01 2013 | Network World

    NSA chief to Black Hat on surveillance: Don't believe press reports

    The head of the NSA sought the help of security pros at Black Hat to advise on an intelligence-gathering system that collects the same data as recently publicized domestic spying programs but without the same perceived civil-liberties shortcomings.
    Read More
  • Aug 01 2013 | CNBC

    Leaker Snowden riles up hacker conferences

    The Black Hat cybersecurity and hacking conference in Las Vegas this week is swarming with young, tech-savvy geeks, many of whom are devoted to the concept of an open and free Internet.
    Read More
  • Aug 01 2013 | Baltimore Sun

    'Trust us' isn't good enough for the NSA

    National Security Agency director Gen. Keith Alexander faced a skeptical crowd at the annual Black Hat hackers convention in Las Vegas on Wednesday, even before news broke that NSA leaker Edward Snowden had been granted temporary asylum in Russia.
    Read More
  • Aug 01 2013 | Venture Beat

    NSA may not be tracking your calls, but it knows what you’re Googling

    Its director, General Keith Alexander, made a public presentation yesterday at Black Hat, a conference of hackers and security professionals in Las Vegas.
    Read More
  • Aug 01 2013 | eWeek

    NSA Leaker Snowden Wins Black Hat Pwnie for 'Epic 0wnage'

    For as many years as I've been coming to Black Hat, one of my favorite activities has been sitting in the Pwnie awards.
    Read More
  • Aug 01 2013 | Fox News

    7 scariest hacks to come out of Black Hat

    As two major hacking events, Black Hat and DEF CON, commence this week in Las Vegas, hackers will unveil some new security flaws in our everyday technology, even internal technology. Pacemakers, specifically.
    Read More
  • Aug 01 2013 | PC Magazine

    Black Hat: Don't Plug Your Phone into a Charger You Don't Own

    This news couldn't wait for the Black Hat conference happening now in Las Vegas. We reported in June that Georgia Tech researchers had created a charging station that could pwn any iOS device. The full presentation revealed precise details on how they managed it.
    Read More
  • Aug 01 2013 | PC Magazine

    Black Hat: Multiple "Master Key" Vulnerabilities Afflict Android

    It all started as a prank, explained Bluebox Security's Jeff Forristal. The Bluebox team wanted to create a hacked version of the FourSquare app that would make it seem like you're somewhere odd, like Antarctica.
    Read More
  • Aug 01 2013 | PC Magazine

    Black Hat: Intercepting Calls and Cloning Phones With Femtocells

    If this sounds scary, it should. This is the Black Hat conference at Las Vegas, and researchers take pride in showing how practically any form of technology can be hacked.
    Read More
  • Aug 01 2013 | Wall Street Journal

    Researchers Demonstrate Attacks on Critical Infrastructure at Black Hat

    Researchers at the Black Hat cybersecurity conference in Las Vegas will demonstrate, Thursday, how it’s possible to attack industrial control systems that control critical infrastructure. The researchers will show how cyber attacks can explode water tanks and disrupt gas pipelines.
    Read More
  • Aug 01 2013 | V3.co.uk

    Black Hat: Bluebox dishes dirt on Android 'Master Key' hack

    Less than a month before Forristal was set to present the flaw at Black Hat, he issued a teaser blog to publically introduce the flaw. The post touched off a media firestorm and speculation that nearly every Android device was vulnerable.
    Read More
  • Aug 01 2013 | Network World

    Black Hat: How to create a massive DDoS botnet using cheap online ads

    The good news is that as soon as you move on to another Web site, the browser is released with no harm done, according to researchers who revealed the hack at the Black Hat security conference.
    Read More
  • July 31 2013 | eWeek

    Hacking RFID Tags Is Easier Than You Think: Black Hat

    That is the conclusion of Francis Brown, managing partner at security firm Bishop Fox, who detailed his research on RFID hacking on July 31 at the Black Hat security conference here. In an interview with eWEEK, Brown said he started out doing his RFID research focused on a specific requirement: He needed to break in to a building.
    Read More
  • July 31 2013 | Las Vegas Review Journal

    Black Hat warning: 'Hackers are in Las Vegas and like to play'

    “You are about to enter one of the most hostile environments in the world,” Black Hat’s registration confirmation says. “Here are some safety tips to keep in mind."
    Read More
  • July 31 2013 | The Verge

    The best of Black Hat and Def Con 2013

    These hackers spent most of their time behind screens, but every year thousands of them head to Las Vegas for the nation's premier conventions on hacking and information security.
    Read More
  • July 31 2013 | PC Magazine

    Black Hat Briefing: Building a Million Browser Botnet for Cheap

    In a presentation at Black Hat in Las Vegas, Jeremiah Grossman, founder and CTO of WhiteHat Security, and Matt Johansen, manager of WhiteHat's Threat Research Center, revealed an extraordinarily simple way anyone can control of thousands or even millions of browsers.
    Read More
  • July 31 2013 | eWeek

    Black Hat: Ads Could Provide a Vehicle for Enslaving Your Browser

    Every day millions of ads are displayed to tens of millions of users across the Web. According to a pair of WhiteHat Security researchers speaking at the Black Hat security conference here, those ads could be the gateway to enslaving your browser into a botnet army.
    Read More
  • July 31 2013 | The Register

    Malicious JavaScript flips ad network into rentable botnet

    In a presentation at the Black Hat conference in Las Vegas on Wednesday, researchers from WhiteHat Security showed off their technique, which uses iframes in web ads to call a JavaScript file that hammers a site with requests.
    Read More
  • July 31 2013 | ThreatPost

    Buy An Ad, Own a Browser Botnet

    Jeremiah Grossman and Matt Johansen of White Hat Security presented their research today at Black Hat USA 2013, research that did not include a zero-day vulnerability or exploit. All they had to do was buy an ad.
    Read More
  • July 31 2013 | Boing Boing

    How ad networks could be use to create a million-strong botnet

    Jeremiah Grossman and Matt Johansen's Black Hat presentation "Million Browser Botnet" demonstrated a real-world attack whereby ad networks were tricked into serving malicious code that caused browsers to open numerous spurious connections to a target site.
    Read More
  • July 31 2013 | Dark Reading

    NSA Director Faces Cybersecurity Community At Black Hat

    NSA director Keith Alexander in a keynote address here today spoke in rare detail about how the intelligence agency's recently leaked surveillance programs have helped the agency and the FBI "connect the dots" and stop terrorists and terrorist plots.
    Read More
  • July 31 2013 | V3.co.uk

    Black Hat: Researchers hack femtocells to grab voice, data and SMS traffic

    Security firm iSEC Partners drew a packed house at the Black Hat conference when it demonstrated a simple system which compromised a Verizon femtocell unit and then used the system to gather nearby mobile traffic.
    Read More
  • July 31 2013 | Network World

    There is plenty new in Security at Black Hat 2013

    Perhaps the biggest thing this year at Black Hat is what is your story on BYOD. We are truly at a new KT boundary not just in security but in computing. We have moved from a PC-dominant era to a new mobile era where phones and tablets outnumber computers.
    Read More
  • July 31 2013 | V3.co.uk

    Black Hat: Microsoft brings fingerprint sensors to Windows 8.1

    Speaking with V3 at the 2013 Black Hat conference, Microsoft Windows security and identity group programme manager Dustin Ingalls said that the company would be investing in both its in-house security tools as well as the options the company provides to third-party security vendors for managing and securing applications.
    Read More
  • July 31 2013 | Tech2

    Black Hat USA: NSA director opens up about PRISM and other surveillance

    With the global spotlight on the US surveillance programme PRISM, there was bound to be an interesting discussion when National Security Agency (NSA) director General Keith Alexander took stage to discuss the agency’s workings.
    Read More
  • July 31 2013 | The Economist

    Hats off

    Every summer Las Vegas plays host to Black Hat, a security shindig where spooks, businesspeople and academics rub shoulders with some of the world’s most talented hackers.
    Read More
  • July 31 2013 | eSecurity Planet

    Black Hat: MACTANS Hacking Apple iOS with a Battery Charger

    Speaking at the Black Hat security conference here, researchers from the Georgia Institute of Technology demonstrated how a small Linux ARM device they call a MACTANS could infect Apple iOS devices with a Trojan.
    Read More
  • July 31 2013 | Silicon Angle

    NSA Hoax? XKeyscore, Bat Boy, and the NSA at Black Hat

    Just today, NSA director General Keith Alexander took the stage at the Black Hat security conference in Las Vegas, where he was heckled throughout his appearance.
    Read More
  • July 31 2013 | PC Magazine

    CloudFlare at Black Hat: Don't Be an Unwilling DDoS Participant

    There are a lot of rooms at the Black Hat security conference. Off to the side in an unmarked location is the Wi-Fi control room for what is arguably one of the most hostile network environments anywhere on the planet.
    Read More
  • July 31 2013 | The Guardian

    NSA director Keith Alexander defends surveillance tactics in speech to hackers

    General tells Black Hat convention surveillance programmes respect privacy and are vital for national security
    Read More
  • July 31 2013 | The Washington Post

    NSA chief asks a skeptical crowd of hackers to help agency do its job

    This is Black Hat, the annual hacker conference. For a few days every year, it takes center stage in the topsy-turvy worlds of cyberspace, network computing and digital security.
    Read More
  • July 31 2013 | Global Post

    Hackers Reject Schmoozing With Spy Agencies Mending Fence

    NSA Director Keith Alexander was heckled during a speech at the Black Hat conference yesterday in which he appealed to hackers to examine “the facts” about the spy programs and to keep working with his agency on cybersecurity defenses.
    Read More
  • July 31 2013 | eWeek

    NSA Chief Says Data Collection Targeted, Obeys Constitutional Limits

    A program used to investigate 54 cases related to terrorism follows strict rules, the head of the National Security Agency tells Black Hat attendees.
    Read More
  • July 31 2013 | Venture Beat

    Spy phones: How everyday hackers can turn your devices against you

    At Black Hat, one of two hacker conferences here this week, the two will present how they took control of a variety of home-network devices that serve as wireless hubs that consumers can use to control their home.
    Read More
  • July 31 2013 | IT World

    Researchers show ways to bypass home and office security systems

    The researchers presented some of the bypass methods they discovered in a talk at the Black Hat USA security conference in Las Vegas on Wednesday, but declined to name any vendors whose products are affected.
    Read More
  • July 31 2013 | CNET

    Tortilla tool makes anonymizer Tor more digestible

    Tor's famous for anonymizing your Internet activities and infamous for being a pain to use. Debuting at Black Hat, the Tortilla tool smooths out some of the global network's rough edges.
    Read More
  • July 31 2013 | Tom's Guide

    NSA Director Defends Surveillance to Angry Audience

    National Security Agency Director Gen. Keith Alexander opened the Black Hat 2013 security conference here this morning with a defense of the NSA's recently leaked programs that was alternately rueful, defiant and witty.
    Read More
  • July 31 2013 | NBC News

    NSA chief addresses hackers as lawmakers grill underlings

    Gen. Keith Alexander, the embattled head of the U.S. National Security Agency, spoke to a tech-savvy and somewhat hostile crowd gathered at the Black Hat conference in Las Vegas, Nev. — where he unapologetically defended wide-ranging intelligence gathering programs.
    Read More
  • July 31 2013 | Nextgov

    Insider Threats ≠ Hackers

    Of the two best tools to detect insider threats in a network, only one can be supplied by a vendor, the FBI’s former chief information security officer said at the Black Hat cybersecurity conference here Wednesday.
    Read More
  • July 31 2013 | Capital Public Radio

    NSA Chief To Hackers: Analysts Don't Abuse Their Power

    Using strong words, Gen. Keith Alexander told the Black Hat convention that stories about leaked documents focus on potential abuse of surveillance data, but he argued reports show analysts rarely stray and if they do, they would be caught by their auditing tools.
    Read More
  • July 31 2013 | NPR

    NSA Director Speaks At Hacker Conference With Mixed Reviews

    Keith Alexander, the NSA director, jousted with hecklers at the Black Hat security conference in Las Vegas on Wednesday as he defended the U.S. spy agency's surveillance programs before a crowd of cybersecurity experts and hackers.
    Read More
  • July 31 2013 | Associated Press

    Government Braces For Coming Changes To NSA Powers

    NSA Director Keith Alexander did not attend Wednesday's hearing. Instead he addressed the Black Hat hackers conference in Las Vegas, where he remained unapologetic even in the face of heckling from the audience.
    Read More
  • July 31 2013 | ThreatPost

    Inside the Security Model of BlackBerry 10

    “As a real security mechanism, I don’t have that much faith in it at the moment, to be honest,” Weinmann said in a talk at the Black Hat 2013 conference here Wednesday.
    Read More
  • July 31 2013 | Network World

    Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security

    The peripherals threat is being discussed this week at the Black Hat USA conference in Las Vegas, where Georgia Tech is presenting the paper "Mactans: Injecting Malware into iOS Devices via Malicious Chargers."
    Read More
  • July 31 2013 | Slash Gear

    iOS 7 features notification to guard against charging station hack vulnerability

    At the Black Hat event taking place in Las Vegas, three individuals showed off a security issue that leaves iPhones and iPads open to hacks when connected to a fake charging station, something they reportedly informed Apple of earlier in 2013.
    Read More
  • July 31 2013 | Network Computing

    DDoS Attacks Getting Bigger, Report Finds

    Camejo and Allison Nixon, who does pen testing and incident response at Integralis, plan to present a talk outlining fundamental flaws in cloud-based DDoS protection this week at the Black Hat security conference.
    Read More
  • July 31 2013 | CBS Las Vegas

    Black Hat Researchers Reveal Smart TV Hacks

    Each year during the hottest part of the summer, Las Vegas becomes a tech hub. Black Hat Security conference is having its sixteenth meeting here, and the Def Con Hacker conference has been held here for more than two decades, nearly always on a weekend that straddles July and August.
    Read More
  • July 30 2013 | Agence France-Press

    How hackers are sharpening 'spear phishing' attacks

    He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."
    Read More
  • July 30 2013 | SC Magazine

    Pwnie 2013 awards nominees announced

    The popular awards were handed out each year at the Black Hat security conference in Las Vegas. A panel of security professionals hand-picked winners in each of the nine categories from nominees selected by the community.
    Read More
  • July 30 2013 | Business Insider

    What Happens At 'Black Hat,' The World's Biggest Conference For Hackers In Las Vegas

    Every year in the ballrooms at Caesar's Palace hotel in Las Vegas, thousands of security experts gather to discuss information security and expose vulnerabilities at the Black Hat conference. It's going on right now through Aug. 1.
    Read More
  • July 30 2013 | GigaOm

    How to tell DEF CON and Black Hat Apart

    Both DEF CON and Black Hat Briefings are influential conventions in the world of security, but they’re still very different. See how they compare.
    Read More
  • July 30 2013 | Wall Street Journal

    Hackers in Las Vegas for Black Hat

    Hackers are converging in Las Vegas this week for the Black Hat USA conference at Caesars Palace. There’s something about going to Black Hat that makes people a little paranoid.
    Read More
  • July 30 2013 | PC Magazine

    How Not to Get Hacked at Black Hat and DefCon

    Some of the brightest minds in security are in attendance at Black Hat and DefCon. For the rest of us, it is in our best interests to be paranoid and exercise some caution.
    Read More
  • July 30 2013 | Reuters

    U.S. to declassify documents on spy programs, surveillance court

    "I think it is the right thing. I think it helps articulate what we are trying to do and why we are trying to do it," [General Keith Alexander] told Reuters in Las Vegas where he is scheduled to speak at the Black Hat conference of cybersecurity experts on Wednesday.
    Read More
  • July 30 2013 | BBC News

    Hacker heroin frame plot' foiled by security blogger

    Mr Krebs will be giving a talk about the rise in DDoS attacks for hire at the Black Hat hackers conference in Las Vegas on 1 August.
    Read More
  • July 30 2013 | Ars Technica

    Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

    Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware. Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express.
    Read More
  • July 30 2013 | TechZone360

    SSH Communications Security Provides Free Risk Assessor Tool

    You have to like SSH Communications Security for its sense of time and place. At the 16th annual Black Hat USA hackers conclave in personal risk taking epicenter Las Vegas, they unveiled SSH Risk Assessor (SRA).
    Read More
  • July 30 2013 | Agence France-Presse

    'Smart' homes open doors to hackers

    Trustwave researchers will share their findings Thursday with peers at a premier Black Hat security conference in Las Vegas and at the infamous Def Con hacker gathering taking place in that city through the weekend.
    Read More
  • July 30 2013 | CRN

    Microsoft Sharing Threat Intelligence Data With Incident Responders

    Sean Barnum, software assurance principal at Mitre, presented the STIX framework to security researchers at the Black Hat 2013 security conference and said he hoped it would be adopted broadly.
    Read More
  • July 30 2013 | ThreatPost

    CrowdSource Tool Aims to Improve Automated Malware Analysis

    The tool, which the researchers will discuss at Black Hat on Thursday, is the work of a group from Invincea that was looking for a way to advance the art of automated malware analysis.
    Read More
  • July 30 2013 | eSecurity Planet

    Black Hat 2013 Preview: All Things Must Be Hacked

    Will NSA's Gen. Keith Alexander take questions? Which security issues should haunt you? The general manager of this week's Black Hat Conference tells all.
    Read More
  • July 29 2013 | Network Computing

    9 Technologies Security Researchers Will Break At Black Hat

    This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
    Read More
  • July 29 2013 | ITBusinessEdge

    The Great Security Risks and Rewards of M2M

    The researchers, Lucas Apa and Carlos Mario Penagos, will present their findings at the Black Hat conference in Las Vegas. They found it possible to do such things as modify readings and disable sensors, the story said.
    Read More
  • July 29 2013 | NPR

    What We're Watching As World's Big Hackers Meet In Las Vegas

    This week the world of tech will turn its attention to Las Vegas, where two separate conferences dedicated to hacking and security are about to get underway. Each year during the height of summer, thousands of security researchers, hacktivists, black hats, white hats and feds descend on Vegas for Black Hat and Def Con.
    Read More
  • July 30 2013 | Agence France-Press

    How hackers are sharpening 'spear phishing' attacks

    He and colleague Joaquim Espinhara are at a premier Black Hat security conference in Las Vegas this week to present a talk titled "Using Online Activity As Digital Fingerprints To Create A Better Spear Phisher."
    Read More
  • July 30 2013 | SC Magazine

    Pwnie 2013 awards nominees announced

    The popular awards were handed out each year at the Black Hat security conference in Las Vegas. A panel of security professionals hand-picked winners in each of the nine categories from nominees selected by the community.
    Read More
  • July 30 2013 | Business Insider

    What Happens At 'Black Hat,' The World's Biggest Conference For Hackers In Las Vegas

    Every year in the ballrooms at Caesar's Palace hotel in Las Vegas, thousands of security experts gather to discuss information security and expose vulnerabilities at the Black Hat conference. It's going on right now through Aug. 1.
    Read More
  • July 30 2013 | GigaOm

    How to tell DEF CON and Black Hat Apart

    Both DEF CON and Black Hat Briefings are influential conventions in the world of security, but they’re still very different. See how they compare.
    Read More
  • July 30 2013 | Wall Street Journal

    Hackers in Las Vegas for Black Hat

    Hackers are converging in Las Vegas this week for the Black Hat USA conference at Caesars Palace. There’s something about going to Black Hat that makes people a little paranoid.
    Read More
  • July 30 2013 | PC Magazine

    How Not to Get Hacked at Black Hat and DefCon

    Some of the brightest minds in security are in attendance at Black Hat and DefCon. For the rest of us, it is in our best interests to be paranoid and exercise some caution.
    Read More
  • July 30 2013 | Reuters

    U.S. to declassify documents on spy programs, surveillance court

    "I think it is the right thing. I think it helps articulate what we are trying to do and why we are trying to do it," [General Keith Alexander] told Reuters in Las Vegas where he is scheduled to speak at the Black Hat conference of cybersecurity experts on Wednesday.
    Read More
  • July 30 2013 | BBC News

    Hacker heroin frame plot' foiled by security blogger

    Mr Krebs will be giving a talk about the rise in DDoS attacks for hire at the Black Hat hackers conference in Las Vegas on 1 August.
    Read More
  • July 30 2013 | Ars Technica

    Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

    Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware. Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express.
    Read More
  • July 30 2013 | TechZone360

    SSH Communications Security Provides Free Risk Assessor Tool

    You have to like SSH Communications Security for its sense of time and place. At the 16th annual Black Hat USA hackers conclave in personal risk taking epicenter Las Vegas, they unveiled SSH Risk Assessor (SRA).
    Read More
  • July 30 2013 | Agence France-Presse

    'Smart' homes open doors to hackers

    Trustwave researchers will share their findings Thursday with peers at a premier Black Hat security conference in Las Vegas and at the infamous Def Con hacker gathering taking place in that city through the weekend.
    Read More
  • July 30 2013 | CRN

    Microsoft Sharing Threat Intelligence Data With Incident Responders

    Sean Barnum, software assurance principal at Mitre, presented the STIX framework to security researchers at the Black Hat 2013 security conference and said he hoped it would be adopted broadly.
    Read More
  • July 30 2013 | ThreatPost

    CrowdSource Tool Aims to Improve Automated Malware Analysis

    The tool, which the researchers will discuss at Black Hat on Thursday, is the work of a group from Invincea that was looking for a way to advance the art of automated malware analysis.
    Read More
  • July 30 2013 | eSecurity Planet

    Black Hat 2013 Preview: All Things Must Be Hacked

    Will NSA's Gen. Keith Alexander take questions? Which security issues should haunt you? The general manager of this week's Black Hat Conference tells all.
    Read More
  • July 29 2013 | Network Computing

    9 Technologies Security Researchers Will Break At Black Hat

    This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
    Read More
  • July 29 2013 | ITBusinessEdge

    The Great Security Risks and Rewards of M2M

    The researchers, Lucas Apa and Carlos Mario Penagos, will present their findings at the Black Hat conference in Las Vegas. They found it possible to do such things as modify readings and disable sensors, the story said.
    Read More
  • July 29 2013 | NPR

    What We're Watching As World's Big Hackers Meet In Las Vegas

    This week the world of tech will turn its attention to Las Vegas, where two separate conferences dedicated to hacking and security are about to get underway. Each year during the height of summer, thousands of security researchers, hacktivists, black hats, white hats and feds descend on Vegas for Black Hat and Def Con.
    Read More
  • July 29 2013 | ZDNet

    Black Hat 2013: talks and panels 'hot list'

    Leading security conference Black Hat boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more. Here's a 'hot list' of 2013's riveting talks and demos.
    Read More
  • July 29 2013 | ITWorld

    Black Hat: Ad networks lay path to million-strong browser botnet

    But research presented at this week’s Black Hat Briefings in Las Vegas suggests that, in addition to our privacy, we may have also surrendered the security to the web, as well.
    Read More
  • July 29 2013 | CRN

    Microsoft Readying Live Hacker Judging At Black Hat

    Hackers will use their working exploits on a Lenovo ThinkPad X1 Carbon Touch, a business Ultrabook, at the Black Hat conference in Las Vegas.
    Read More
  • July 29 2013 | Help Net Security

    Don't get pwned at Black Hat, DEF CON

    You go and participate, but otherwise operate normally, working, emailing, texting, tweeting. But not at DEF CON, or even its corporate sister event Black Hat, which run next week in Las Vegas.
    Read More
  • July 29 2013 | SC Magazine

    The chilling effects of the Volkswagen injunction on British research

    At this week's Black Hat conference in Las Vegas, Charlie Miller and Chris Valasek will present on on-board car computer insecurities to thousands.
    Read More
  • July 29 2013 | eSecurity Planet

    Home Invasion 2.0: Attacking the Smart Home

    At the upcoming Black Hat security conference, researchers will discuss, in detail, multiple sets of vulnerabilities found in home automation systems that could enable a new and technologically advanced generation of home invasions.
    Read More
  • July 29 2013 | Hispanic Business

    750 Million Mobile Phones Vulnerable to SIM Card Security Flaw

    Most newer SIM Cards use a newer security system and are immune from the attack, but users who haven't changed their SIM Card for several years could be vulnerable.The GSM Association has already been notified of the problem, which will be explained in more detail at the Black Hat conference next week.
    Read More
  • July 29 2013 | Hispanic Business

    Rising Cases of Malware and Breaches of Cyber-security on Smartphones

    Alcatel-Lucent will demonstrate the risks of a mobile spyphone at the Black Hat 2013 security event.
    Read More
  • July 29 2013 | SC Magazine

    Car hackers' appearance on the 'Today' show was important because they were on the 'Today' show

    "I think people fear the unknown," Trey Ford, general manager of Black Hat, the hacking conference that will precede DefCon this week, told me recently. "There's this spooky factor. There's a certain taint these guys are smeared with. You're fighting a moniker and a fear of the unknown."
    Read More
  • July 29 2013 | Motherboard

    The Internet of Things Can Be Hacked, Too

    Where the big fat security risk comes in is the tools used to manage these networked objects, which function like a remote control for the house. Security researchers will be talking about the problem at this week’s Black Hat conference, in a briefing called “Home Invasion 2.0.”
    Read More
  • July 29 2013 | Bloomberg

    The Hacker Who Poked Holes in Medical Devices

    Barnaby Jack, the 36-year-old hacker with a showman's flair whose death was reported last week, set an ambitious goal a few years back: Help secure the millions of insulin pumps, pacemakers and other medical devices implanted in people around the world.
    Read More
  • July 28 2013 | PC Magazine

    16 Years of Black Hat: The Changing Face of Cyberattacks

    Body
    Read More
  • July 28 2013 | The Register

    British boffin muzzled after cracking car codes

    Garcia's treatment is in stark contrast to the laurels being heaped on America's Charlie Miller and Chris Valasek ahead of the upcoming Black Hat conference in Las Vegas. Their demonstration of how to interfere with on-board computers was accepted at the Vegas con.
    Read More
  • July 26 2013 | PC Magazine

    Black Hat 2013: Hacking Home Security Systems, Cars, NSA

    The Black Hat conference and DEF CON are where white hat, black hat, blue hat, and grey hat types rub elbows. There Federal government and law enforcement folks listen to some of the latest research coming out of the community, and rumor has it some career recruiting happens there, too.
    Read More
  • July 26 2013 | Threatpost

    Malware Evasion Techniques Dissected at Black Hat

    At Black Hat next week, researchers Claudio Guarnieri, Mark Schloesser and Jurriaan Bremer will conduct a session on malware evasion techniques and conduct demonstrations using their open source project, Cuckoo Sandbox, a 2½ year old technology that is a staple with many researchers, as well as enterprises and government agencies.
    Read More
  • July 26 2013 | Threatpost

    How to Fail at Black Hat

    Black Hat and DEF CON week can be an overwhelming and confusing experience, especially for the uninitiated or agoraphobic. But fear not, Threatpost has your back.
    Read More
  • July 26 2013 | Government Computer News

    New program could foil hackers in the cloud

    This year’s Black Hat Briefings get underway in Las Vegas in a few days, and GCN’s Bill Jackson will be there to chronicle the latest trends in hacking and cyber defense. In the meantime, here is a little hacking nightmare to wet your whistle.
    Read More
  • July 28 2013 | Forbes

    Your Net Worth Is Online -- And Less Safe Than Ever

    The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities.
    Read More
  • July 26 2013 | TechHive

    Study finds that hackers can attack oil, gas field sensors with radio transmitters

    Apa and Penagos are scheduled to give a presentation next Thursday at the Black Hat security conference in Las Vegas but gave IDG News Service a preview of their research.
    Read More
  • July 26 2013 | GigaOm

    Breaking into the smart home of the future

    Midway through the Black Hat USA 2013 security confab, which begins later this month, researchers plan to give a series of talks on breaking into the home of the future, Security Ledger reports.
    Read More
  • July 26 2013 | Mobile Magazine

    R2B2 Robot Can Crack Your Android PIN Code

    The R2B2 will be shown off at the Black Hat security conference in Las Vegas.
    Read More
  • July 25 2013 | CSO

    How to avoid a social engineering attack at Black Hat and Def Con

    Some of the world's most skilled social engineers and hackers head to Las Vegas next week for Black Hat and Def Con. Heed these nine tips and avoid becoming a victim yourself while at the events.
    Read More
  • July 25 2013 | NBC News

    Hackers could clone your office key card ... from your pocket

    Brown will present his findings at Black Hat, a computer security conference held in Las Vegas next week. In his presentation, Brown will even teach attendants to make their own versions of the devices by modifying a commercial RFID reader with an Arduino microcontroller.
    Read More
  • July 25 2013 | Upstream

    Demonstration of cyber attacks planned

    The presentations at the Black Hat conference beginning in Las Vegas on Wednesday will show how key industries remain vulnerable to cyber attacks, in part because companies are reluctant to replace expensive equipment or install new safeguards unless ordered to do so by regulators or offered economic incentives, experts say.
    Read More
  • July 25 2013 | Fox News

    Is there a security flaw with your SIM card?

    Video: Chris Weber on new technology allowing hackers to obtain mobile data and control victims' cell phones
    Read More
  • July 24 2013 | Info Security Magazine

    Calling All IT Security Professionals: How to Stay Secure at BlackHat and DEFCON

    Hacker conferences, like Black Hat and DEFCON, are notorious for highlighting the security missteps of attendees. Before the show, which takes place in Las Vegas next week, IT security professionals should take every security precaution to prevent being hacked.
    Read More
  • July 24 2013 | SiliconANGLE

    Vulnerability Statistics Suck

    It is this last point, if you are attending Black Hat USA on behalf of your organization that might make this session worth attending. Martin and Christey will provide concrete examples of both the misuse and abuse of vulnerability statistics.
    Read More
  • July 24 2013 | TechHive

    R2B2 wants to push your phone's buttons, will guess your PIN in hours

    The robot will be on display at this year's Black Hat security conference, which starts this weekend.
    Read More
  • July 24 2013 | Sacramento Business Journal

    HBGary launching new cyber-security software

    HBGary is launching the new product at Black Hat USA 2013, a security trade show, next Wednesday in Caesar’s Palace in Las Vegas.
    Read More
  • July 24 2013 | IT Web

    Android security testing tool unveiled

    An Android security testing tool, drozer, is being unveiled at Black Hat, in Las Vegas, on 1 August.
    Read More
  • July 24 2013 | Gizmodo

    This $200 Brute Force Bot Will Bust Your Phone's Pin in Hours

    The Robotic Reconfigurable Button Basher will be presented by researchers at the Black Hat conference next week in Las Vegas.
    Read More
  • July 24 2013 | SC Magazine

    Android "master key" flaw under active attack for first time

    Forristal plans to reveal more details about the vulnerability at the Black Hat conference next week in Las Vegas.
    Read More
  • July 24 2013 | Dark Reading

    Moving Away From Rash Hashing Decisions

    Black Hat talk will discuss shortcomings of the latest technical evolution of hashing passwords for safe storage in databases, propose a competition to design something better
    Read More
  • July 23 2013 | Threatpost

    Long-Range RFID Hacking Tool to be Released at Black Hat

    Next week at the Black Hat Briefings in Las Vegas, Brown will release the end result: a modified RFID reader that can capture data from 125KHz low frequency RFID badges from up to three feet away.
    Read More
  • July 23 2013 | Computerworld

    FDA asks hackers to expose holes in medical devices, but many researchers fear CFAA & jail

    Black Hat USA, which normally has 80-90 talks, will feature a record-breaking number of 110 talks this year.
    Read More
  • July 23 2013 | The Times of India

    A mobile can be hacked in 2 minutes via SMS

    The research, due to be presented at an upcoming Black Hat security conference in US, cites phones running the risk of their security being breached due to use of the old cryptography technique.
    Read More
  • July 23 2013 | Dark Reading

    Visualization Helps Attackers Spot Flaws In Software's Armor

    Simple data visualization techniques can be used to find weaknesses in the software technologies designed to protect operating systems from exploitation, according to a pair of researchers who will present their findings at Black Hat USA next week.
    Read More
  • July 23 2013 | PC World

    Report: Android spyware infections on the rise

    In order to demonstrate the risks posed by such threats, Kindsight has developed a proof-of-concept spy-phone program that can be injected into other Android applications and can provide the attacker with backdoor access to enterprise networks. He plans to present it at the Black Hat USA 2013 security conference in Las Vegas next week.
    Read More
  • July 23 2013 | Help Net Security

    SIM encryption flaw opens 500M users to attack

    Nohl has been in contact with the GSM Association about his research and has shared with them the results. He is also scheduled to appear this week at the Black Hat Conference in Vegas, where he will demonstrate the exploit.
    Read More
  • July 23 2013 | FierceCIOTechWatch

    Why vulnerability data doesn't tell the whole story

    Scheduled to give a talk at the upcoming Black Hat USA conference (July 27--August 1) on this topic, they spoke to eWeek about the challenge of maintaining a large vulnerability repository while ensuring that consistency and quality are not compromised.
    Read More
  • July 22 2013 | The Register

    Mobe SIM crypto hijack threatens millions: Here's HOW IT WORKS

    Nohl claims to have found a flaw in that separation, though he won't be making the details public until next month's Black Hat conference.
    Read More
  • July 22 2013 | Reuters

    Half a billion mobile SIM cards deemed vulnerable to being remotely hacked, copied and used for fraud

    Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin’s Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | eWEEK

    Black Hat: Don't Blindly Trust Vulnerability Data

    Researchers at Black Hat plan to discuss some of the common ways data about vulnerabilities is used to draw false conclusions about security.
    Read More
  • Jul 22 2013 | Internet News

    Black Hat: Ironic Exploitation of Security Devices

    In a Black Hat webcast last week, Ben Williams, consultant with NCC Group, detailed his investigation into security devices.
    Read More
  • Jul 22 2013 | Silicon Angle

    Black Clouds On The Computing Horizon

    For Black Hat USA, Williams plans to demonstrate DropSmack v2, showing not only how it operates but also explaining how to deploy it within your own operational environment.
    Read More
  • Jul 22 2013 | PC World

    SIM card hack has severe implications for business

    A German cryptographer named Karsten Nohl will be presenting findings to that effect at the annual Black Hat computer security conference at the end of the month.
    Read More
  • Jul 22 2013 | Dark Reading

    SIM Card Hack A Wakeup Call

    Famed encryption researcher Karsten Nohl of Security Research Labs will show at Black Hat USA next week how he was able to hack some SIM cards in mobile phones by cracking the Data Encryption Standard (DES) keys used for over-the-air updates.
    Read More
  • Jul 22 2013 | Wall Street Journal

    Report: SIM Cards are Hackable

    Nohl plans to present his findings at Black Hat, a large hacker conference in Las Vegas next week.
    Read More
  • Jul 22 2013 | ComputerWorld

    750 million phones vulnerable to spying: Hack SIM card via tainted text to get root

    Nohl will present his research during “Rooting SIM cards” at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 22 2013 | ABC News

    SIM Hack Can Expose Cell Phones to Crooks

    "It's a tiny computer that [usually] runs Java," said Karsten Nohl, the Chief Scientist at Security Research Labs who will present his findings at the Black Hat USA conference later this month.
    Read More
  • Jul 22 2013 | PC Magazine

    Encryption Bug in SIM Card Can be Used to Hack Millions of Phones

    More details will be revealed during his presentation at the Black Hat conference in Las Vegas later this month.
    Read More
  • Jul 22 2013 | CNET

    SIM card flaw said to allow hijacking of millions of phones

    Nohl, who plans to detail the flaw at the Black Hat security conference in Las Vegas next month, said he has already shared the results of his two-year study with GSM Association, a trade group representing the cell phone industry.
    Read More
  • Jul 22 2013 | Reuters

    UN warns on mobile cybersecurity bugs in bid to prevent attacks

    Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | BBC News

    Millions of Sim cards are 'vulnerable to hack attack'

    Mr Nohl said he planned planned to reveal more information about the vulnerability at the Black Hat security conference in Las Vegas later this month.
    Read More
  • Jul 22 2013 | Ars Technica

    Crypto flaw makes millions of smartphones susceptible to hijacking

    Nohl plans to further describe the attack at next week's Black Hat security conference in Las Vegas.
    Read More
  • Jul 22 2013 | San Jose Mercury News

    Apple developers site hacked; SIM card flaw discovered

    Nohl will present his findings at the Black Hat hacking conference in Las Vegas, which begins at the end of the week.
    Read More
  • Jul 22 2013 | TechNewsWorld

    SIM Card Flaw Could Wreak Havoc on Millions of Phones

    Security Research founder Karsten Nohl will present his firm's findings at the Black Hat conference to be held in Las Vegas at the end of this month.
    Read More
  • Jul 22 2013 | The Inquirer

    SIM card encryption exploit leaves mobile phone users vulnerable to hacking

    The research, which is due to be presented at the Black Hat security conference next week, has been detailed on a blog post by SRL founder and cryptographer Karsten Nohl, who said that the use of outdated 1970s cryptography could be exploited, granting hackers access to a device's location and SMS functions.
    Read More
  • Jul 22 2013 | New York Times

    Encryption Flaw Makes Phones Possible Accomplices in Theft

    Mr. Nohl said he was not planning to disclose the identities of the operators whose SIM cards had performed poorly in his study at the Black Hat conference in August.
    Read More
  • Jul 22 2013 | CIO

    Researcher Finds Major Encryption Flaw in Older Mobile SIM Cards

    What Nohl has spent two years researching could turn out to be the most significant flaw in SIMs in many years when he reveals its full details at a presentation scheduled for the Black Hat security conference at the end of this month.
    Read More
  • Jul 22 2013 | The Register

    SIM crypto CRACKED by a SINGLE text, mobes stuffed with spyware

    While Nohl is holding back some details of the attack until his Black Hat convention talk, he says he has developed a technique that allows him to obtain the 56-bit DES encryption key of a SIM by sending a text message that spoofs the phone's operator.
    Read More
  • Jul 22 2013 | TechNewsDaily

    SIM Card Flaw Opens Millions of Phones to Attack

    Nohl discussed the issue on his blog in preparation for a more comprehensive exploration of the topic at the Black Hat hackers' conference Aug. 1 in Las Vegas.
    Read More
  • Jul 22 2013 | Red Orbit

    Newly Discovered SIM Card Vulnerability Could Compromise Millions Of Mobile Phones

    SRL founder and cryptographer Karsten Nohl, who discovered the flaw and will present his findings at the Black Hat computer security conference on July 31, told Forbes staff writer Parmy Olson the two-part vulnerability is based on an outdated security standard and poorly configured code that allows hackers to remotely infect SIM cards with viruses.
    Read More
  • Jul 22 2013 | Extreme Tech

    The humble SIM card has finally been hacked: Billions of phones at risk of data theft, premium rate scams

    SIM cards that use newer, stronger encryption (Triple DES), don’t appear to be susceptible to these attack vectors, but Nohl says he’ll give more information at his Black Hat talk at the end of July.
    Read More
  • Jul 22 2013 | SC Magazine

    SIM card DES flaw could affect up to 500 million users

    Presenting at the Black Hat conference this week in Las Vegas, German security researcher Karsten Nohl will present his findings based on the tests of 1,000 SIM cards.
    Read More
  • Jul 22 2013 | International Business Times

    750 Million Cell Phones At Risk Of Remote Hacking Due To SIM Card Security Flaw

    OTA software updates are encrypted short messenger service, SMS, messages sent from the carrier to the SIM card. The findings will be presented at the Black Hat 2013 in Las Vegas on Aug. 1.
    Read More
  • Jul 22 2013 | Mashable

    SIM Card Hack Allows Attackers to Remotely Control Victim's Phone

    Nohl will be presenting his research at the upcoming Black Hat security conference, held in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | The Guardian Nigeria

    ‘750 million mobile phones vulnerable to SIM card security flaw’

    The GSM Association, the body has already been notified of the problem, which will be explained in more detail at the Black Hat conference next week.
    Read More
  • Jul 22 2013 | The Examiner

    GSM encryption vulnerability leaves 750 million SIMs at risk: Researcher

    On Aug. 1, he plans to present the full details of his research at the 2013 Black Hat security conference in Las Vegas.
    Read More
  • Jul 22 2013 | Pentagon Post

    Major vulnerability in SIM cards unearthed by German researchers, UN’s ITU to issue advisory

    The Security firm will detail the lacunae at the forthcoming Black Hat hacking conference which is going to take place in Las Vegas on July 31st.
    Read More
  • Jul 22 2013 | The Telegraph

    Millions of phones susceptible to 'massive SIM security flaw'

    Nohl will present his research, "Rooting SIM cards," at the Black Hat security conference in Las Vegas on 31 July 2013.
    Read More
  • Jul 22 2013 | Engadget

    Some SIM cards can be hacked 'in about two minutes' with a pair of text messages

    The GSM Association has been given some details of the exploit, which have been forwarded to carriers and SIM manufacturers that use DES. Nohl plans to spill the beans at the upcoming Black Hat meeting.
    Read More
  • Jul 22 2013 | Fast Company

    HOW YOUR CELLPHONE COULD BE HACKED "IN ABOUT TWO MINUTES" VIA TEXT MESSAGE

    Mr Nohl will uncover the rest of his findings at the Black Hat convention in Las Vegas next month.
    Read More
  • Jul 22 2013 | Latinos Post

    SIM Card Bug Could Expose Millions of Cell Phones to Remote Attack - Especially in Developing Countries

    More details are expected to emerge at the Black Hat cyber security conference in Las Vegas at the end of this month.
    Read More
  • Jul 22 2013 | 9 to 5 Mac

    Two minute SIM card hack could leave 25 percent of phones vulnerable to spying

    Nohl will report his findings in detail at the Black Hat security conference in August, but he has already provided details to mobile operators so that they can address the vulnerability.
    Read More
  • Jul 22 2013 | Slash Gear

    SIM card hack possible with a couple of text messages

    Nohl also plans to reveal his findings during the upcoming Black Hat conference.
    Read More
  • Jul 22 2013 | The Independent

    Sim cards hacked: A single text that unlocks millions of mobiles

    Nohl will give full details of his method at a Black Hat security conference on July 31st but has already provided industry body GSMA with all of his research.
    Read More
  • Jul 22 2013 | TechSpot

    SIM card flaw could put nearly half a billion phones at risk

    Nohl will be presenting his findings at the Black Hat security conference in Las Vegas at the end of the month.
    Read More
  • Jul 22 2013 | SC Magazine Australia

    Hundreds of millions at risk from SIM card vulnerability

    Nohl said he will be discussing his findings in greater detail at the upcoming Black Hat conference later this month.
    Read More
  • Jul 22 2013 | Daily Mail

    Half a billion SIM cards could be bugged or have information stolen from them because of 'serious security flaws'

    Nohl plans to announce the full details of the flaw during a Black Hat security conference in July.
    Read More
  • Jul 22 2013 | Guardian Express

    SIM Card Flaw Exposes Millions of Phones to Hijacking

    The German cryptographer genius will be revealing his findings to a packed Black Hat security conference later this month in Las Vegas.
    Read More
  • Jul 22 2013 | RT

    ‘We become the SIM card’: 750 million mobile phones could be hacked in one minute

    Nohl will detail his break-in at a Black Hat, a hackers conference that begins in Las Vegas at the end of July.
    Read More
  • Jul 22 2013 | V3.co.uk

    SIM card security flaws leave billions of mobile phones vulnerable to attacks

    The full research on the SIM security flaw is due to be presented by SRLabs' Karsten Nohl at the Black Hat conference in Las Vegas on 31 July.
    Read More
  • Jul 22 2013 | Geek

    Cryptographer cracks the SIM card, millions of devices may be vulnerable

    At the upcoming Black Hat conference in Las Vegas, German cryptographer Karsten Nohl will explain how he can remotely take over these millions of devices.
    Read More
  • Jul 22 2013 | TechRepublic

    Weekend news round-up: Apple gets hacked; so too does the SIM

    Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas on July 31, says his is the first hack of its kind in a decade, and comes after he and his team tested close to 1,000 SIM cards for vulnerabilities, exploited by simply sending a hidden SMS.
    Read More
  • Jul 22 2013 | Tru Tower

    Up to 750 Million SIM Cards At Risk of Hacking With Two Simple SMS Text Messages

    Nohl, who is also credited with finding a security flaw in GSM call encryption several years ago, will be providing additional details at the Black Hat conference in Las Vegas on August 1.
    Read More
  • Jul 22 2013 | The Voice of Russia

    Up to 750 million mobile phones could be hacked

    He will disclose the details of SIM cracking at a Black Hat hacking conference that opens in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | Gizmodo

    Millions Of Cell Phones Could Be Vulnerable To This SIM Card Hack

    Though Nohl isn't officially presenting his findings until the Black Hat security conference in Las Vegas on July 30, he did share them with the GSM Association.
    Read More
  • Jul 22 2013 | E&T Magazine

    Mobile phone SIM cards prone to cyber attacks

    The German team will publicly present the detailed findings at the Black Hat hacking conference in Las Vegas at the end of July.
    Read More
  • Jul 22 2013 | Gearburn

    SIM card bug targets ‘millions of phones’ with simple hack

    He reported his findings to the GSM Association and in August, will reveal his findings at the Vegas-based Black Hat conference.
    Read More
  • Jul 22 2013 | TechWeek Europe

    SIM Card Encryption Weaknesses Could Expose Millions

    Karsten Nohl, chief scientist at Security Research Labs, is due to present his findings at Blackhat later this month.
    Read More
  • Jul 22 2013 | Silicon Angle

    SIM Card Vulnerability Puts One Quarter of all Phones At Risk

    He plans to outline the vulnerability in more detail at the Black Hat Conference in Las Vegas next month.
    Read More
  • Jul 22 2013 | The Verge

    750 million phones could be vulnerable in massive SIM security flaw

    With the "responsible disclosure" taken care of, Nohl will detail his attack method at the Black Hat security conference on August 1st.
    Read More
  • Jul 22 2013 | Northern Voices Online

    SIM card hacking is a reality, hundreds of millions may be affected

    In his findings that would be presented during the forthcoming the Black Hat security conference in Las Vegas on July 31, Nohl said that the revelation came after he and his team tested nearly 1000 SIM cards for the defect.
    Read More
  • Jul 22 2013 | TechRadar UK

    'We can spy on you,' says mobile expert who can hack SIMs with texts

    Nohl has reported the findings of his study to the GSM Association and will present the research in full on August 1 at the Black Hat computer hackers' conference in Las Vegas.
    Read More
  • Jul 22 2013 | Think Digit

    Researcher finds exploitable vulnerability in SIM card encryption

    Nohl will be presenting his research on, "Rooting SIM cards" in the Black Hat security conference in the US on July 31.
    Read More
  • Jul 22 2013 | The Fonecast

    New security threat takes advantage of SIM cards and 'over the air' updates

    More details of the issue will be presented at the Black Hat security conference next week.
    Read More
  • Jul 22 2013 | Geeky Gadgets

    SIM Card Hack Could Affect Millions Of Mobile Phones

    Karsten Nohl has been working on hacking SIM cards for the last three years, and he will present his finding at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 22 2013 | The Economic Times

    Mobiles may be vulnerable to spying due to outdated tech

    The research, due to be presented at an upcoming Black Hat security conference in the US, cites phones running the risk of their security being breached due to use of the old cryptography technique.
    Read More
  • Jul 22 2013 | InfoSecurity Magazine

    SIM Cards Cracked; Hundreds of Millions of Phones Vulnerable

    Details will be presented by a German researcher at Black Hat on 31 July.
    Read More
  • Jul 22 2013 | Inc.com

    This Week in Tech: Is an iPad Giant Coming?

    Later this month, researcher Karsten Nohl will present a new finding at the Black Hat conference in (where else?) Las Vegas.
    Read More
  • Jul 22 2013 | Boing Boing

    Some phones can be pwned by sending two SMS messages to them

    He disclosed the vulnerability to the GSM association early, and on August 1 he'll present his work at Black Hat in Las Vegas.
    Read More
  • Jul 22 2013 | Silicon Republic

    Weekend news round-up: Apple gets hacked; so too does the SIM

    Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas on July 31, says his is the first hack of its kind in a decade, and comes after he and his team tested close to 1,000 SIM cards for vulnerabilities, exploited by simply sending a hidden SMS.
    Read More
  • Jul 22 2013 | Ventures Africa

    UN Warns On SIM Card Cloning By Hackers

    The hackers have the capability to use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin’s Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | IT Web

    'Millions of SIMs at risk

    While details of the vulnerability will be revealed next week at Black Hat, in Las Vegas, the research team has so long presented the findings to the UN’s International Telecommunication Union (ITU), which has described them as “hugely significant”.
    Read More
  • Jul 22 2013 | Free Radio

    Mobile Phone Flaw Opens 500m SIMs To Hackers

    The technique will be presented at the Black Hat hacking conference that opens in Las Vegas on July 31.
    Read More
  • Jul 22 2013 | Austrian Tribune

    New research finds significant vulnerabilities in mobile phone technology

    Noting that the bug gives hackers the ability to remotely gain control of, as well as clone, certain mobile SIM cards, Berlin's Security Research Labs - the German firm which has discovered the bug and will describe the vulnerabilities at the forthcoming Black Hat hacking conference - said that compromised SIMs can potentially be used by hackers to either commit financial crimes or engage in electronic spying.
    Read More
  • Jul 22 2013 | InfoWorld

    'SIM cards vulnerable to hacking, says researcher

    'Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.
    Read More
  • Jul 22 2013 | CIO Today

    SIM Card Flaw Leaves 750 Million Phones at Risk

    Nohl, who will be presenting his findings at the Black Hat security conference in Las Vegas next week, tested 1,000 SIM cards over a two-year period and has come to the conclusion that as many as 750 million cell phones globally could be vulnerable to these relatively easy attacks.
    Read More
  • Jul 22 2013 | DecryptedTech

    750 million SIM cards in danger of hack attacks

    Demonstration of this type of SIM card hacking, Karsten will do at the Black Hat conference in Las Vegas, which will be held from July 27th to August 1st this year.
    Read More
  • Jul 19 2013 | Network World

    Black Hat: Top 20 hack-attack tools

    The Black Hat conference convening in Las Vegas next week offers hacker tools for all of those plus more.
    Read More
  • Jul 19 2013 | SC Magazine

    Fear of prosecution hampers security research

    This year has seen a huge number of submissions – Black Hat, for instance, is putting on a record 110 talks – but longtime veterans of the gatherings said that most of the presentations won't go quite as far as they can or should.
    Read More
  • Jul 19 2013 | eSecurity Planet

    Exploiting Security Devices? Oh, the Irony

    In a Black Hat webcast this week, Ben Williams, consultant with NCC Group, detailed his investigation into security devices.
    Read More
  • Jul 19 2013 | HelpNetSecurity

    Major vulnerabilities in office security and RFID systems

    At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and RFID‑based badging systems.
    Read More
  • Jul 19 2013 | SC Magazine UK

    Newly developed Mac malware from 'Operation Hangover' to be presented next week

    Researchers from Norman Shark, who revealed the advanced persistent threat (APT) infrastructure 'Operation Hangover' in May, will present at next week's Black Hat conference in Las Vegas on new Mac malware they found in the attacks.
    Read More
  • Jul 19 2013 | CSO

    How to avoid getting pwn3d at Black Hat

    There's a lot to learn at Black Hat and DEFCON, and if you're not careful you might find attackers making an example of you and letting you learn about security the hard way.
    Read More
  • Jul 19 2013 | HelpNetSecurity

    Hijacking connected cars with a $25 tool

    A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars via electronic means is not only easy, but cheap to execute as well.
    Read More
  • Jul 18 2013 | Dark Reading

    Researchers To Highlight Weaknesses In Secure Mobile Data Stores

    At Black Hat USA, a team of mobile-security researchers plans to show off ways to circumvent the security of encrypted containers meant to protect data on mobile devices
    Read More
  • Jul 17 2013 | PCWorld

    Security company to release testing tool for SAP mobile access

    Onapsis is also scheduled to present two SAP security workshops at the Black Hat security conference in Las Vegas, which kicks off on July 27.
    Read More
  • Jul 17 2013 | VICE Motherboard

    Without Def Con, the Feds Have a Hacker Recruitment Problem

    "Black Hat strives to cultivate interaction, innovation, and partnership within that security ecosystem—we bring offense and defense together, private and public," Ford said.
    Read More
  • Jul 17 2013 | eWEEK

    Researcher Proposes Using Machine Learning to Improve Network Defense

    The Black Hat Conference late in July will include a presentation by a security researcher about a project aimed at using machine learning to improve security monitoring and event detection.
    Read More
  • Jul 16 2013 | PC Magazine

    Chinese Researcher Reports New "Hidden Trojan" Android Attack

    BlueBox will report the full details of their research at the Black Hat conference in a few weeks.
    Read More
  • Jul 16 2013 | CRN

    Researchers Reveal Way To Hack Into Verizon's Network

    The attack they plan to demonstrate at Black Hat involves obtaining physical access to the Network Extender devices.
    Read More
  • Jul 16 2013 | Fierce CIO

    Security researchers turn Verizon femtocell into spy tool

    For now, the researchers plan to demonstrate their proof of concept system at the Black Hat and Def Con hacking conferences in Las Vegas.
    Read More
  • Jul 16 2013 | Silicon Angle

    Big Data And A Black Hat

    In just over a week, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas.
    Read More
  • Jul 16 2013 | Dark Reading

    'Tortilla' Spices Up Active Defense Ops

    A researcher later this month at Black Hat USA will release a free tool that simplifies the use of Tor and makes it more approachable for all types of security researchers, not just malware analysts.
    Read More
  • Jul 16 2013 | The Register

    Pwn all the Androids, part II: Flaw in Java, hidden Trojan

    Bluebox Security has avoided going into details prior to its upcoming Black Hat presentation on 1 August but the work of Oliva Fora and other security researchers has revealed that the current Android app security shenanigans stem from duplicate filename trickery in Android application installer files rather than something more esoteric, such as a hash collision.
    Read More
  • Jul 16 2013 | Popular Science

    A Hacked Mobile Antenna In A Backpack Could Spy On Cell Phone Conversations

    The security experts aren't saying how, waiting to disclose it in a few weeks to a pair of hacker conferences in Las Vegas, the Black Hat and Def Con conferences.
    Read More
  • Jul 16 2013 | Network World

    Open-source tool to ease security researchers' quest for secrecy

    Called Tortilla, the tool will be available for free on CrowdStrike's Website July 31, the day it is presented by developer Jason Geffner at the Black Hat USA conference in Las Vegas, Nev.
    Read More
  • Jul 15 2013 | SC Magazine

    Verizon femtocell can be manipulated to monitor cell phone use

    The pair is expected to provide more information in a couple of weeks at the Black Hat and DefCon hacker shows in Las Vegas.
    Read More
  • Jul 15 2013 | InfoSecurity Magazine

    Verizon Hack Turns Femtocells into Mobile Spy Stations

    Security firm iSEC Partners plans to show off a proof of concept for a hacked Verizon femtocell at the upcoming Black Hat and Def Con hacking conferences in Las Vegas.
    Read More
  • Jul 15 2013 | International Business Times

    Verizon Device Rigged Into A Spying Module That Can Eavesdrop On Wireless Mobile Phone Customers Calls, Data: Hackers Claim

    Ritter and his colleague, Doug DePerry, would be presenting their findings at the Black Hat and Def Con hacking conferences in Las Vegas, where more than 15,000 security experts and hackers are expected to participate, according to the Reuters report.
    Read More
  • Jul 15 2013 | Gizmodo

    It's a Cinch for Hackers to Break Into Your Verizon Network

    "This is not about how the NSA would attack ordinary people," said Thomas Ritter, one of the security experts. "This is about how ordinary people would attack ordinary people."
    Read More
  • Jul 15 2013 | Mashable

    Hackers Convert Verizon Device Into Mobile Spy Stations

    The finding was reported by various media outlets on Monday, and researchers will provide further detail at the Las Vegas hacking and security conferences Def Con and Black Hat, which take place back-to-back at the end of July.
    Read More
  • Jul 15 2013 | San Francisco Chronicle

    Cell phone amplifiers can be hacked

    The group declined to say exactly how it gained access to the devices, but said it will provide additional details at the Black Hat security conference this year in Las Vegas.
    Read More
  • Jul 15 2013 | Internet News

    Black Hat Changes Wi-Fi Vendors - The Network Will Still be HOSTILE

    Black Hat is quite literally one of the most hostile networks on Earth. Rogue access points pop up all the time and people openly try to sniff each others traffic.
    Read More
  • Jul 15 2013 | The Register

    Femtocell flaw leaves Verizon subscribers' Wi-Fi and mobile wide open

    Tom Ritter and Doug DePerry from iSEC Partners demonstrated the snooping hack to Reuters using a Verizon Wireless Network Extender ahead of a lecture at the Black Hat hacking conference to be held later this month.
    Read More
  • Jul 15 2013 | Digital Trends

    How to protect your fancy new ‘Connected Home’ from savvy hackers

    Any device that can talk to another device or the internet can potentially be hackabled to do something unintended by its creator or owner, and this will soon be demonstrated publicly at Black Hat #Fouladi and DEF CON.
    Read More
  • Jul 15 2013 | Hot Hardware

    Researchers Hack Verizon Femtocell, Snoop On User Calls and Texts

    However, they will demonstrate the process at the Black Hat conference and Def Con conference in Las Vegas soon.
    Read More
  • Jul 15 2013 | ComputerWorld

    Can you hear me now? Yeah, hacked Verizon device can nab your texts and photos too

    No worries as you can "spot" a plethora of feds at Black Hat, which has no such "time-out" request.
    Read More
  • Jul 15 2013 | Reuters

    Researchers hack Verizon device, turn it into mobile spy station

    The two said they plan to give more elaborate demonstrations two weeks from now at the Black Hat and Def Con hacking conferences in Las Vegas.
    Read More
  • Jul 12 2013 | Search Security

    2013 Black Hat conference: Feds welcome!

    Black Hat's mission is to cultivate the conversations and relationships between our communities that will in turn help define and defend the future of security.
    Read More
  • Jul 12 2013 | Slate

    One Major Hacker Conference Bans the Feds. Another Welcomes Them.

    Ford still feels like the hackers and feds have similar interest in warding off cyber-attacks and protecting “the internet at large”—even if the ways the NSA does so happen to be criminal in nature by many accounts.
    Read More
  • Jul 11 2013 | Ars Technica

    As DefCon asks Feds to take “time-out,” Black Hat welcomes NSA chief

    General Keith Alexander, the Director of the NSA and Commander of the DOD's US Cyber Command, has been announced as the keynote speaker at the upcoming Black Hat USA security conference at Caesar's Palace in Las Vegas.
    Read More
  • Jul 11 2013 | Christian Science Monitor

    Hacker conference tells Feds not to attend

    The General Manager of Black Hat, Trey Ford, acknowledges the polarizing effects the NSA's surveillance program revealed by Mr. Snowden had in the relationship between the federal government and civilian hackers, but he says that the existence of such a program was long suspected in the hacker community.
    Read More
  • Jul 11 2013 | The Guardian

    NSA director Keith Alexander to speak at hacker conference in Las Vegas

    Army General Keith Alexander, the director of the NSA and the leader of the US Cyber Command, is slated to give a keynote presentation at Black Hat, a convention that bills itself as bringing together "all facets of the infosec [information security] world – from the corporate and government sectors to academic and even underground researchers."
    Read More
  • Jul 11 2013 | The Atlantic Wire

    Hackers Are Now Leery About Inviting the NSA to Their Conventions

    "We are honored to have General Alexander join us this year at Black Hat in Las Vegas for the first time. We couldn't have asked for a better time to welcome him," said Black Hat general manager Trey Ford.
    Read More
  • Jul 11 2013 | Dark Reading

    How Attackers Thwart Malware Investigation

    A researcher at Black Hat USA this month will dissect a recent attack, showing off attackers' techniques for making malware analysis harder and intelligence gathering more time consuming
    Read More
  • Jul 11 2013 | Dark Reading

    DEF CON Founder Urges Feds To Take A 'Time Out' From The Hacker Conference

    Black Hat strives to cultivate interaction, innovation, and partnership within the security ecosystem -- offense and defense, public and private. I think this is an interesting move for them; we will all be watching to see what happens next," Ford says.
    Read More
  • Jul 10 2013 | InformationWeek

    Hack 99% Of Android Devices: Big Vulnerability

    Oliva also addressed criticism that he'd put Android users at risk or preempted the "One Root To Own Them All" presentation scheduled to be delivered by Bluebox's Forristal next month at the Black Hat conference in Las Vegas.
    Read More
  • Jul 10 2013 | SC Magazine

    Android flaw allows hijack of any app to go unnoticed

    Forristal plans to reveal more details about the vulnerability later this month at the Black Hat conference in Las Vegas, where he'll divulge a proof-of-concept for major Android device vendors, as well as explain how the exploit was created and how it works.
    Read More
  • Jul 10 2013 | IT World

    Android App Signing Flaw Underscores Patch Paralysis

    Forristal disclosed the problem to Google in February and went public with details of it ahead of a talk he’s scheduled to give at The Black Hat Briefings hacker conference in Las Vegas at the end of this month.
    Read More
  • Jul 10 2013 | eSecurity Planet

    Inside the Bluebox Android Master Key Vulnerability

    Forristal plans to detail the full story of how the Android master key flaw was discovered in a presentation at the Black Hat security conference later this month.
    Read More
  • Jul 10 2013 | Dark Reading

    Preparing For Possible Future Crypto Attacks

    The pattern should concern security professionals because a number of academic breakthroughs in solving a complex mathematics problem could have a real impact on the security of the crypto systems that underpin much of today's Internet's security, three security consultants will argue at the Black Hat Security USA Briefings later this month.
    Read More
  • Jul 10 2013 | ZDNet

    Proof of concept for Android flaw found, patches start rolling out

    The company's CTO wrote a lengthy, high-level post about the issue, but didn't explain exactly how the security flaw works, saving the details for his BlackHat talk.
    Read More
  • Jul 10 2013 | iProgrammer

    Android Security Hole More Stupid Error Than Defect

    The big problem was that the details of the exploit were to be presented at the Black Hat Briefings in August.
    Read More
  • Jul 09 2013 | Dark Reading

    New Techniques Obfuscate, Optimize SQL Injection Attacks

    Black Hat researcher to demonstrate new methods for getting around defenses even more quickly to extract database data through SQLi
    Read More
  • Jul 09 2013 | PC Magazine

    Android Master Key Bug Not a Risk if You Stick With Google Play

    Bluebox plans to reveal more details during the Black Hat conference in Las Vegas at the end of this month.
    Read More
  • Jul 09 2013 | Ars Technica

    Google patches critical Android threat as working exploit is unleashed

    Until Bluebox researchers release more details at the Black Hat security conference later this month, readers should take this threat seriously.
    Read More
  • Jul 09 2013 | Tech News Daily

    How Hackers Found a Security Startup's Secret Android Flaw

    For the full story, the world was supposed to wait until Aug. 1, when Bluebox planned to unveil the details in a presentation at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 09 2013 | The H Security

    Exploit for Android signing hole published

    An exploit for the Android code signing hole, which was revealed a few days ago by Bluebox in advance of a presentation at the BlackHat conference, has now been published on GitHub.
    Read More
  • Jul 09 2013 | Digital Trends

    IT’S OK! ANDROID’S LATEST MALWARE SCARE PROBABLY WON’T AFFECT YOU

    The Bluebox CTO, Jeff Forristal, is planning to release technical details of the issue at his talk at Black Hat USA 2013 at the end of the month.
    Read More
  • Jul 09 2013 | The Register

    Android sig vuln exploit SEEN IN THE WILD

    Github user “Poliva” – Pau Oliva Fora, whose LinkedIn profile identifies him as an engineer at viaForensics in Spain – created the script apparently without access to the promised extra information that Bluebox plans to present at Black Hat USA in August.
    Read More
  • Jul 09 2013 | TechNewsWorld

    Google Sticks a Thumb in Android Security Dike

    Bluebox will disclose technical details of how the vulnerability is exploited at Black Hat USA 2013, to be held in Las Vegas later this month.
    Read More
  • Jul 09 2013 | Android Police

    Infamous "Master Key" Exploit Was Quietly Patched By Google In February, CyanogenMod Following Suit Today, OEMs... At Some Point

    At the end of May, we posted about Jeff Forristal and his session at Black Hat USA 2013 titled "One Root To Own Them All."
    Read More
  • Jul 09 2013 | Tom's Hardware

    Android Has a 4-Year-Old Vulnerability, Affects Most

    The technical details surrounding the issue, including the related tools and material, won't be made public until Forristal's presentation at Black Hat USA 2013 in Las Vegas at the end of the month.
    Read More
  • Jul 08 2013 | Dark Reading

    Google Android Vs. Apple iOS: The Mobile App Privacy War

    Android security has been in the spotlight during the past few days, as vendor Bluebox Security announced plans to release details of a serious Android vulnerability exploit at the upcoming Black Hat security conference in Las Vegas.
    Read More
  • Jul 08 2013 | WCCF Tech

    Latest Android Security Flaw – a Real Scare or Just a Hiccup

    Note: in late July, at the upcoming hackers’ conference – the Blackhat USA 2013 security conference – Bluebox will release proofs-of-concept of its exploits for each device vendor.
    Read More
  • Jul 08 2013 | AsiaOne

    99 per cent of Android apps vulnerable to attackers without breaking signatures

    Researchers at Bluebox Security, a mobile security startup firm in San Francisco, uncovered the flaw and will be addressing the issue in detail at the Black Hat USA security conference in Las Vegas in coming weeks.
    Read More
  • Jul 08 2013 | CRN

    Serious Android Flaw Could Turn Mobile Apps Malicious

    Bluebox Chief Technology Officer Jeff Forristal will present the details of the vulnerability later this month at the 2013 Black Hat conference in Las Vegas.
    Read More
  • Jul 05 2013 | Boston Herald

    Security hole puts 99 percent of Android’s 900 million phones at risk

    Bluebox intends to detail the flaw at the Black Hat USA conference at the end of this month, but in the meanwhile it’s written a blog delving into some detail.
    Read More
  • Jul 05 2013 | Telecompaper

    Bluebox identifies Android security vulnerability - report

    Bluebox intends to detail the flaw at the Black Hat USA Conference at the end of July 2013, but in the meantime has written a blog providing some detail.
    Read More
  • Jul 05 2013 | Daily Gagetry

    Android Master Key Security Flaw Found

    Bluebox intends to detail the flaw at the Black Hat USA conference at the end of this month but in the meanwhile it’s written a blog delving into some detail.
    Read More
  • Jul 05 2013 | Headlines and Global News

    BlueBox Uncovers ‘Master Key’ To Any Android Phone

    Further details on the "master key" will be disclosed during the Black Hat hacker conference in August this year.
    Read More
  • Jul 05 2013 | Lifehacker Australia

    Are All Android Phones Vulnerable To A New Malware Attack?

    Bluebox hasn’t issued a detailed description yet of how the vulnerability works; this will apparently be disclosed at the US Black Hat conference at the end of July.
    Read More
  • Jul 05 2013 | The Canadian

    Failure existing four years ago can affect 99% of Androids

    More details about the failure must be submitted during the Black Hat conference in Las Vegas, what happens at the end of the month.
    Read More
  • Jul 05 2013 | Travelers Today

    Android Master Key: Potentially Dangerous Weakness Discovered In Google Smart Phone Operating System

    The company reported the bug to Google in February and is planning to reveal more information about the weakness at the Black Hat hacker conference in August.
    Read More
  • Jul 05 2013 | Latinos Post

    Long-Existing Exploit Exposes 900 Million Android Systems to Hackers

    Bluebox Labs will go into more technical detail, along with talking about how Bluebox found the bug, how it works, and other materials, at Bluebox's presentation at the Black Hat USA 2013 conference.
    Read More
  • Jul 05 2013 | The Examiner

    Android security vulnerability discovered, affects 99 percent of end users

    Bluebox said that it had reported the bug to Google back in February. Forristal said the company plans to reveal more information about the issue at the Black Hat hacker conference being held in August this year.
    Read More
  • Jul 05 2013 | Capital Technologies

    Android’s Master Key Security Mistakes Discovered

    During the Black Hat hacker conference to be held in August, Mr Forristal is currently planning to disclose more facts and information about the problem and gives out serious possible resolutions.
    Read More
  • Jul 05 2013 | Red Orbit

    99 Percent Of Android Devices Vulnerable To Hacking

    BlueBox alerted Google about this vulnerability in February and will explain how the bug affects Android later this month at the Black Hat USA Security Conference in Las Vegas, Nevada.
    Read More
  • Jul 05 2013 | Venture Beat

    Massive Android flaw lets hackers ‘take over’ and ‘control’ 99% of Android devices

    If an attacker successfully gains control of an Android device — and Bluebox will be revealing technical details of the vulnerability at hacker conference Black Hat USA 2013 in late July — the hacker essentially gains control of all permissions on the phone or tablet.
    Read More
  • Jul 05 2013 | The Christian Science Monitor

    Security flaw affects 99 percent of Android phones: report

    Additional details about the security issue will be released during the Black Hat USA 2013 security conference on August 1.
    Read More
  • Jul 04 2013 | BBC News

    'Master key' to Android phones uncovered

    Mr Forristal is planning to reveal more information about the problem at the Black Hat hacker conference being held in August this year.
    Read More
  • Jul 04 2013 | TechCrunch

    Android ‘Master Key’ Security Hole Puts 99% Of Devices At Risk Of Exploitation

    Bluebox intends to detail the flaw at the Black Hat USA conference at the end of this month but in the meanwhile it’s written a blog delving into some detail.
    Read More
  • Jul 04 2013 | Maximum PC

    Security Firm Finds Gaping Hole in Android’s Security Fabric

    The Black Hat USA 2013 security conference does not get underway until July 27, 2013, but there is already plenty to look forward to, with the folks at Bluebox Security dropping a bombshell by claiming to have unearthed a yawning hole in Android’s security fabric and promising to shed some technical light on the vulnerability during the upcoming conference.
    Read More
  • Jul 04 2013 | The Droid Guy

    Android “Master Key” Security Flaw Puts 99% Of Devices At Risk

    Details of this flaw haven’t been revealed yet but the mobile security company plans to do it at the Black Hat USA conference later this month.
    Read More
  • Jul 04 2013 | Mobile Magazine

    Android Bug Discovered, Could Affect Android 1.6 Donut And Later

    More details about Bluebox’s study will be revealed at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 04 2013 | Global Christian Post

    Android Flaw Exposes Massive Hacker Vulnerability; 99 Percent of Devices Affected

    The security firm will showcase its findings more thoroughly at the Black Hat USA security conference in Las Vegas in later July, ComputerWorld reported.
    Read More
  • Jul 04 2013 | University Herald

    Android Malware Allows Hackers to Send Texts, Make Calls and Access Your Camera

    Forristal is set to be a speaker at the Black Hat USA 2013 conference at the end of July and will give a talk on the Android bug.
    Read More
  • Jul 04 2013 | HelpNetSecurity

    Android bug allows app code change without breaking signatures

    The flaw was responsibly disclosed with Google in February 2013, and the company will be sharing more details about the bug in a talk at the upcoming Black Hat USA security conference in Las Vegas.
    Read More
  • Jul 04 2013 | Gizmodo

    A 4-Year-Old Android Bug Could Bring Malware to 99% of Devices

    Bluebox will present the research later this month at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 04 2013 | Silicon Angle

    Android Security Flaw Puts 99% Of All Devices At Risk

    The company says that it plans to reveal proofs-of-concept at the upcoming Blackhat USA 2013 security conference.
    Read More
  • Jul 04 2013 | Know Your Mobile: India

    Android vulnerability puts 99% devices at risk

    Bluebox will be giving more information about this bug at the Black Hat Conference in Las Vegas later this month.
    Read More
  • Jul 04 2013 | The Fonecast

    Android vulnerability could affect 900 million devices, says Bluebox Security

    The company says it notified Google in February and plans to reveal more details about the issue at the Black Hat USA 2013 security conference in a few weeks.
    Read More
  • Jul 04 2013 | Business Insider

    99% of All Android Phones Have A 'Master Key' Flaw That Gives Hackers A Back Door

    Google was alerted to the flaw in February, Forristal told the Black Hat USA conference for internet security experts.
    Read More
  • Jul 04 2013 | SC Magazine Australia

    Flaw makes '99%' of Android phones open to hijacking

    Forristal will release more details at BlackHat Las Vegas this month.
    Read More
  • Jul 04 2013 | CSO Australia

    Before first bug bounty payout, Microsoft says new program is working

    The company will judge some of the mitigation bypasses at the upcoming Black Hat conference in Las Vegas at the end of July.
    Read More
  • Jul 04 2013 | GigaOm

    Here’s why most users won’t be affected by the latest Android flaw

    Bluebox will also release proofs-of-concept of its exploit, for each device vendor, at the upcoming Blackhat USA 2013 security conference.
    Read More
  • Jul 04 2013 | Phys.Org

    Bluebox Security reveals Android vulnerability in run up to Blackhat convention

    The company is also promising to reveal more about the nature of the vulnerability at this year's Black Hat USA 2013 conference.
    Read More
  • Jul 04 2013 | TechSpot

    Android flaw leaves 99% of devices open to attacks, details to be revealed at BlackHat

    Technical details and related tools will be released at his BlackHat USA 2013 talk by the end of the month.
    Read More
  • Jul 04 2013 | Bit-Tech

    Android 'master key' discovery raises security risk

    A new security vulnerability, due to be described in-depth by Bluebox CTO Jeff Forristal at the Black Hat USA 2013 conference, spells trouble for Android users.
    Read More
  • Jul 04 2013 | Hot Hardware

    Android Update Vulnerability Lets Malware Bypass Digital Signature Check, 900 Million Potentially Affected

    Android, like any operating system, is vulnerable to exploits. And every year about this time, we see a flurry of openings crop up as Black Hat approaches.
    Read More
  • Jul 04 2013 | Slash Gear

    Android vulnerability discovered affecting devices running version 1.6 and later

    The security firm says it will release “tools/material” and more info about this vulnerability during Blackhat USA 2013, which takes place later this month.
    Read More
  • Jul 04 2013 | Tech Eye

    Hole found in Android code base

    Security experts at Bluebox Security will disclose details on the vulnerability at the upcoming Black Hat Briefings in Las Vegas next month.
    Read More
  • Jul 04 2013 | The Verge

    Four year old Android bug could allow malicious apps on '99 percent' of devices

    Bluebox will reveal the full details of its research later this month at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 03 2013 | ComputerWorld

    Proof-of-concept exploit available for Android app signature check vulnerability

    The Bluebox researchers only provided a high-level description of the bug and its potential impact, keeping the technical details for an upcoming presentation at the Black Hat security conference in Las Vegas.
    Read More
  • Jul 03 2013 | Dark Reading

    HTTPS Side-Channel Attack A Tool For Encrypted Secret Theft

    A new side channel vulnerability in HTTPS traffic could make it possible for targeted attackers to dig up secrets like session identifiers, CSRF tokens, OAuth tokens, and ViewState hidden fields without users ever being the wiser, say researchers who will explain how the attack could work at this year's Black Hat.
    Read More
  • Jul 01 2013 | GMA News

    'Malware-like' app makes your phone spy on you

    TechHive.com said McNamee plans to present the espionage tool, a proof-of-concept program, at the Black Hat USA conference.
    Read More
  • Jul 01 2013 | CSO

    Researchers turn Android phone into Agent 007 tool

    McNamee plans to present the espionage tool at the Black Hat USA conference next month.
    Read More
  • Jun 28 2013 | InfoSec News

    Researcher To Demo Spy-Phone At Black Hat Las Vegas 2013

    Now one researcher plans to show off a proof-of-concept program at the Black Hat Security Briefings this summer that can compromise a phone and turn it into just such an eavesdropping platform.
    Read More
  • Jun 28 2013 | Dark Reading

    'BinaryPig' Uses Hadoop To Sniff Out Patterns In Malware

    At the Black Hat Security Briefings in late July, one trio of researchers plans to release a framework for using Hadoop and the Apache Pig platform for parallelization that makes analyzing large sets of malware programs easier.
    Read More
  • Jun 27 2013 | Dark Reading

    Microsoft's Big Bucks For Bugs Ups The Ante

    "Microsoft made a very wise play for key defense mechanisms to focus this bug bounty program on," Ford says.
    Read More
  • Jun 26 2013 | Dark Reading

    Researcher To Demo Spy-Phone At Black Hat

    Using the ability to inject malicious code into applications on Android devices, a researcher will demonstrate at Black Hat how to create the infrastructure to spy on mobile users
    Read More
  • Jun 25 2013 | Dark Reading

    Vulnerability Severity Scores Make For Poor Patching Priority, Researchers Find

    Relying on the measure of vulnerability severity to prioritize what to patch and what to put off for another day is a waste of effort on software flaws that pose no danger, while missing others that are being exploited, according to two researchers that plan to reveal their findings at the Black Hat Security Briefings later this year.
    Read More
  • Jun 25 2013 | Network World

    Hacking and attacking automated homes

    That's about to change. At Black Hat USA 2013, Behrang Fouladi and Sahand Ghanoun will present "Honey, I'm home!! - Hacking Z-Wave Home Automation Systems."
    Read More
  • June 24 2013 | TechWeek Europe

    Black Hat 2013 To Focus On Mobile Security, Cryptography

    Black Hat USA 2013 is expected to draw a crowd of 6,500 from around the world when the convention opens 27 July.
    Read More
  • June 23 2013 | eWEEK

    Black Hat 2013 Set to Shine Security Light on Vulnerabilities

    In another month, security researchers, IT professionals and hackers of all stripes will descend on Las Vegas for the annual Black Hat security conference.
    Read More
  • June 20 2013 | Maximum PC

    Microsoft Unveils Bug Bounty Program at Black Hat 2013

    Microsoft joins the ranks of those offering up bug bounties to individuals who root out security holes in its products, though the program isn't limited to finished products.
    Read More
  • June 20 2013 | CiOL

    Hacking security camera: 'Nothing great, we can solve it'

    The researcher has promised to disclose the vulnerabilities to the vendors before his presentation at Black Hat conference, Las Vegas, starting 31 July.
    Read More
  • June 20 2013 | USA Today

    ANALYSIS: Why Microsoft is willing to pay bug bounties

    Bounties help "massively," says Trey Ford, general manager of the Black Hat cybersecurity conference.
    Read More
  • June 20 2013 | Beta News

    Microsoft will pay you to successfully hack Windows

    While these bounty programs will launch on June 26, Microsoft is separately inviting people to hack Windows 8.1 live at this year’s Black Hat USA 2013.
    Read More
  • June 20 2013 | Windows IT Pro

    Microsoft Announces Bug Bounty Programs

    The following bug bounty programs will launch June 26, which coincides with the start of the Black Hat 2013 security conference in Las Vegas
    Read More
  • June 19 2013 | InformationWeek

    Microsoft Dangles $100,000 Bug Bounty

    At the Black Hat USA 2013 conference, scheduled for July 27-Aug. 1, Microsoft plans to invite anyone who wants to participate in its Mitigation Bypass Bounty to do so live before its judging committee in the Black Hat Sponsor Hall.
    Read More
  • June 19 2013 | SC Magazine

    Microsoft's new bug bounty program offers up to $11k in incentives

    On Wednesday, Trey Ford, the general manager for Black Hat, the annual security conference in Las Vegas that features discussions, training and live hacking demonstrations, told SCMagazine.com that Microsoft eventually…
    Read More
  • June 19 2013 | The Register

    Microsoft breaks bug-bounty virginity in $100,000 contest

    At this year's Black Hat USA conference – held at the end of July in the sweaty hell that is Las Vegas at that time of year – Microsoft will offer $100,000 (and a laptop) to the hacker who can demonstrate a critical vulnerability in Windows 8.1, either at the conference or afterwards.
    Read More
  • June 19 2013 | eSecurity Planet

    Microsoft Launches Bug Bounty Program

    Trey Ford, general manager of Black Hat, told eSecurity Planet that many researchers put in a great deal of work, often with no thanks, appreciation, or payment.
    Read More
  • June 19 2013 | InfoWorld

    With bug bounties, Microsoft extends an olive branch to hacker community

    As part of the announcement, Microsoft will host a live Mitigation Bypass Bounty event at Black Hat USA 2013, where participants will attempt to hack the newest version of Windows in front of a judging committee. The winner will take home $100,000 and the accompanying laptop.
    Read More
  • June 19 2013 | Dark Reading

    Microsoft Establishes Rewards Programs For Windows 8.1, Internet Explorer 11 Preview Security Bugs

    At the upcoming Black Hat conference in Las Vegas, Microsoft will invite anyone who wants to participate in the Mitigation Bypass Bounty to do so live during the convention next month.
    Read More
  • June 19 2013 | ThreatPost

    Microsoft Launches $100,000 Bug Bounty Program

    Moussouris said Microsoft will have some of the people who will judge the mitigation bypass entries on site at Black Hat next month and they will be inviting researchers to demonstrate their submissions live.
    Read More
  • June 19 2013 | TechNewsDaily

    Microsoft Offers to Pay for Software Bugs

    It tested the waters with a security contest at last summer's Black Hat security conference in Las Vegas, awarding a young Ph.D. student $200,000 for coming up with new defenses against complex attacks.
    Read More
  • June 19 2013 | Memeburn

    Microsoft to crowdsource Windows 8.1 security, offers $100k bounties

    Sure, it offers the Blue Hat prize annually at the Black Hat conference and the grapevine reveals exploits through competitions like Pwn2Own, but that’s way too sporadic for a company that services the majority of the world’s home and corporate desktop computers.
    Read More
  • June 19 2013 | Forbes

    Microsoft Bug Bounty Program Puts Big Bucks On The Line

    The $200,000 grand prize was awarded at the Black Hat security conference in Las Vegas last summer. Now, Microsoft is taking things to another level.
    Read More
  • June 19 2013 | Forbes

    Microsoft Finally Offers To Pay Hackers For Security Bugs With $100,000 Bounty

    At the Black Hat conference last year it awarded the first Blue Hat prize for researchers who develop defensive techniques against exploits, totally $260,000 in rewards.
    Read More
  • June 19 2013 | SecurityWeek

    Researcher to Demonstrate Hollywood Style Attack at BlackHat

    Craig Heffner, a vulnerability researcher for Tactical Network Solutions in Columbia, MD, is returning to Black Hat this summer with a presentation that will include a proof-of-concept attack against network surveillance cameras that is usually reserved for the movies.
    Read More
  • June 19 2013 | Security Management

    Morning Security Brief: Cybersecurity Improvements, CCTV Vulnerability, Human Trafficking and ID Theft Raids

    Heffner will be presenting his research at the Black Hat USA 2013 Conference in Las Vegas, July 27 to August 1.
    Read More
  • June 18 2013 | Security Magazine

    Expert: Surveillance Cameras Vulnerable to Hacking

    He plans to demonstrate techniques for exploiting these bugs at the Black Hat hacking conference, which starts July 31 in Las Vegas.
    Read More
  • June 18 2013 | CrackBerry

    Black Hat 2013 Session To Discuss BlackBerry 10 OS From a Security Perspective

    If you're genuinely interested in how effective BlackBerry 10 security is then you'll most certainly be interested in checking out the upcoming Black Hat US 2013 conference being held in Las Vegas July 27th - August 1st.
    Read More
  • June 18 2013 | Berry Review

    Black Hat 2013: Sessions on BlackBerry 10 Security, Ultimate Android Root Exploit & iOS Charger Malware

    There are some interesting briefings happening at the blockbuster hacker convention, Black Hat 2013, in Vegas at the end of next month.
    Read More
  • June 18 2013 | Computer Business Review

    Surveillance Cameras Vulnerable to Remote Attacks

    The US security expert will demonstrate techniques for exploiting the discovered bugs at the upcoming Black Hat hacking conference starting July 31, 2013, in Las Vegas.
    Read More
  • June 18 2013 | InfoSecurity Magazine

    Surveillance Cameras Can Be Hacked - Who Is Watching You?

    He will not, he says, disclose the vulnerabilities to the vendors before his presentation at Black Hat, Las Vegas, starting 31 July.
    Read More
  • June 18 2013 | The Blaze

    Ex-NSA Expert: Common Security Camera Systems Can Be Easily Hacked to Spy on You

    Heffner will present his findings at the Black Hat hacker conference, which begins July 31 in Las Vegas and has Gen. Keith Alexander, the head of the NSA, as its keynote speaker.
    Read More
  • June 18 2013 | ITWire

    How Secure Is That Security Camera?

    Craig Heffner, a former US National Security Agency (NSA) software developer will demonstrate how to hack the myriad of public and private security cameras at a Black Hat Hacking conference in Las Vegas on 31 July.
    Read More
  • June 18 2013 | ITWire

    Security Backdoors Extremely Prevalent

    An unnamed IBM researcher told Black Hat conference attendees that "These openings can still expose information about us to hackers and allow them to 'watch' our Internet activity.
    Read More
  • June 18 2013 | The Sydney Morning Herald

    Surveillance Cameras Can Be Hacked: Expert

    Heffner's presentation is one of more than 100 talks at the annual gathering, which is expected to attract 6500 security professionals who will learn about the growing threat hackers pose to businesses, consumers and national security.
    Read More
  • June 17 2013 | End The Lie

    Security Expert: High-End Surveillance Cameras Can Be Used By Hackers to Spy on Sensitive Facilities

    Heffner will reportedly examine some of the so-called “zero-day” vulnerabilities during his talk, “Exploiting network surveillance cameras like a Hollywood hacker,” at the upcoming Black Hat hacking conference, starting July 31 in Las Vegas.
    Read More
  • June 17 2013 | Business Insider

    Ex-NSA Expert: Common Security Camera Systems Can Be Easily Hacked to Spy on You

    He plans to demonstrate techniques for exploiting these bugs at the Black Hat hacking conference, which starts July 31 in Las Vegas.
    Read More
  • June 17 2013 | Reuters

    U.S. Security Expert Says Surveillance Cameras Can Be Hacked

    He plans to demonstrate techniques for exploiting these bugs at the Black Hat hacking conference, which starts July 31 in Las Vegas.
    Read More
  • June 10 2013 | ITWire

    Researchers Hack iPhone with USB Charger

    The three plan to discuss the research at the Black Hat computer security conference in Las Vegas
    Read More
  • June 10 2013 | The Columbus Dispatch

    Researchers Hack Apple Devices Via Charger

    The three plan to discuss their work — which the university says was done in the name of enhancing security — at next month’s Black Hat computer-security conference in Las Vegas.
    Read More
  • June 10 2013 | Sydney Morning Herald

    iPhone Charger Can Hack Into Apple Devices

    The three plan to discuss their work, which the college says was done in the name of enhancing security, at the Black Hat computer security conference in Las Vegas next month.
    Read More
  • June 07 2013 | Smart Planet

    A Charger That Hacks iPhones

    The researchers will demonstrate the break-in tool at the Black Hat conference, a cat-and-mouse gathering that attracts hackers as well as information security experts. This year’s confab runs July 27 through August 1 in Las Vegas.
    Read More
  • June 05 2013 | Silicon Beat

    Security Alert: iPhone Hack, Facebook Malware, Cyber-Espionage and More

    The team will explain the details at July’s Black Hat security conference in Las Vegas. In a summary of their presentation, they say the “alarming” hack is as simple as plug-and-infect.
    Read More
  • June 05 2013 | Internet News

    Apple iOS Charger MACTANS Black Hat Hack Powered By Open Source?

    The annual Black Hat USA security conference is coming up at the end of July and the hype around big attacks has already started.
    Read More
  • June 05 2013 | iDigital Times

    Apple Products Can Be Easily Hacked With Malicious Chargers

    The team has planned to reveal its research at the Black Hat computer security conference which is scheduled to begin from 27 July in Las Vegas.
    Read More
  • June 05 2013 | Tech2

    Researchers to Show How to Install Malware in iPhones, iPads with Just a Charger

    At the upcoming Blackhat Security Conference in July, three researchers plan to showcase a proof-of-concept that they claim can install malware into an Apple device that is plugged into it.
    Read More
  • June 05 2013 | GizmoCrave

    Beware! Chargers Can Spit Poision In To Your Apple iPhone

    The researchers would be elaborating on how USB capabilities can be misused for cracking Apple’s security mechanism at Black Hat USA 2013 this summer.
    Read More
  • June 04 2013 | WIRED UK

    Proof-of-Concept USB Chargers Developed to Hack iOS Devices

    The results of the experimentation by Billy Lau, Yeongjin Jang and Chengyu Song will be presented in full at a talk during the Black Hat security conference in Las Vegas …
    Read More
  • June 04 2013 | The Independent

    The Malicious Plug-in: A Charger that Can Hack Any Apple iOS Device

    The report comes from the conference notes for Black Hat, a security conference taking place in late July.
    Read More
  • June 04 2013 | Digital Trends

    iOS Users Beware! Your Charger Can Be Used to Load Malware Onto Your Device

    The finding will be presented in great depth at this year’s Black Hat USA 2013, which takes place in Las Vegas from July 27 through August 1. They will discuss Mactans, the name they’ve given the hacked chargers, and how they work.
    Read More
  • June 04 2013 | Fierce CIO

    Researchers Say They Can Inject Malware Into iOS Devices via Charging Ports

    Currently scheduled to present their findings at Black Hat 2013 conference in July, the trio will unveil their proof of concept power charger built using a BeagleBoard.
    Read More
  • June 04 2013 | Computer Business Review

    Researchers Say Apple's iOS Devices Can be Hacked Using a Malicious Charger

    Three researchers plan to demonstrate their outcome at the upcoming Black Hat USA 2013 conference.
    Read More
  • June 04 2013 | V3.co.uk

    Apple iPhone Security Breached by Modified Chargers

    The team, who will present their work at the forthcoming Black Hat security conference in Las Vegas, claim the method works for handsets running the latest version of iOS and does not require a jailbroken phone.
    Read More
  • June 04 2013 | Digital Journal

    Researchers: Current Apple iOS Devices Vulnerable to Charger Hack

    Previewing a presentation they are planning to give in July at the 2013 Black Hat hacker conference, researchers with the Georgia Institute of Technology claim that a corrupted bogus device charger could deliver malicious software onto the operating system of any Apple device.
    Read More
  • June 04 2013 | International Design Times

    New iPhone Charger Hack Could Be a Throwback to 2011: iOS Hackers David Wang and Jonathan Zdziarski Weigh In

    According to an abstract from the researchers upcoming Black Hat presentation, these malicious iPhone chargers they have created and dubbed "Mactans" will have the ability to install malware on a device without user consent, and then hide the installed apps so that the user is completely unaware their security has been compromised.
    Read More
  • June 04 2013 | New Europe Online

    iPhones Can Be Hacked With Malicious Chargers

    Three researchers from the Georgia Institute of Technology will demonstrate at the Black Hat hacker conference in July that Apple's iPhone can be easily hacked with a custom-built charger.
    Read More
  • June 04 2013 | Digital Spy

    Apple iPhone 'Can Be Hacked with Modified Charger'

    The researchers are due to present their findings at the Black Hat conference next month, and will make recommendations to Apple about how to improve its security.
    Read More
  • June 04 2013 | PHYS.org

    Georgia Tech Trio to Reveal iOS Test Exploit at Black Hat

    Next month at the Black Hat conference, however, three security researchers from Georgia Tech will show that using chargers to power up iOS devices may be a direct path to insecurity.
    Read More
  • June 04 2013 | News After Dawn

    Malicious Charger Can Hijack iPhones

    They are due to provide more detailed information on the attack method at the Black Hat USA conference this year.
    Read More
  • June 03 2013 | Mashable

    This Malicious Charger Can Hack Your iPhone

    Researchers will reveal the device at the annual security conference Black Hat, held in Las Vegas at the end of July.
    Read More
  • June 03 2013 | BGR

    Your iPhone Can Be Hacked With a Malicious Charger

    The team will show off a proof-of-concept of the hack at the BlackHat security conference in late July, however until then they are revealing little about the method.
    Read More
  • June 03 2013 | Wireless and Mobile News

    iPhone 5, 4S, 4 & iPad 1-Retina Hackable

    The device will be shown at the Black Hat Conference in late July in Las Vegas. Researchers at Georgia Tech have found a way to get into Apple devices with sneaky, spy charger.
    Read More
  • June 03 2013 | iPhone FAQ

    Don't Plug Your iOS Device Into This Charger

    At least that's the result of their research to create a proof-of-concept malicious accessory, to be fully revealed at the Black Hat security conference this July.
    Read More
  • June 03 2013 | Huffington Post UK

    iPhone Hacked in 60 Seconds By Modfied Charger

    The team at the Georgia Institute of Technology intend to showcase the charger at the Black Hat 2013 hacker conference in July.
    Read More
  • June 03 2013 | ComputerWorld

    Black Hat: It Only Takes a Minute to Hack an iPhone

    Institute of Technology. Researchers Billy Lau, Yeongjin Jang, and Chengyu Song at the Black Hat security conference will present the hack next month.
    Read More
  • June 03 2013 | The Verge

    Any iOS Device Can Be Hacked Within One Minute with Modified Charger, Says Researchers

    The hack and charger will be demonstrated at the Black Hat security conference in July. During a presentation of their findings, the researchers will detail how USB capabilities are able to bypass Apple's defense mechanisms, and explain what Apple can do to make hacks like this one harder to pull off.
    Read More
  • June 03 2013 | Gearburn

    Jailbreak any iOS Device With 'Malicious Chargers' Says Black Hat Specialist

    There’s one event held every year that we should all be aware of, and that’s the hacker-focused Black Hat conference.
    Read More
  • June 03 2013 | ExtremeTech

    Black Hat Hackers Break Into Any iPhone in Under a Minute, Using A Malicious Charger

    Mactans, which is named after the black widow spider’s Latin taxonomy, will be demonstrated by Billy Lau, Yeongjin Jang, and Chengyu Song at the Black Hat 2013 conference in July.
    Read More
  • June 03 2013 | Gizmodo

    Your iPhone Can Be Hacked With a Modified Charger

    The research, which is to be presented at the Black Hat security conference in late July and was spotted by Forbes, was born out of the idea of creating innocent-looking devices which could be used to hack phone.
    Read More
  • June 03 2013 | The Register

    Look Out, Fanbois! EVIL Charger Will Inject FILTH into your iPHONE

    Billy Lau, Yeongjin Jang and Chengyu Song will debut their evil plug at the Black Hat USAconference, which starts at the end of July.
    Read More
  • June 03 2013 | Slash Gear

    iPhone Vulnerable to Hacking with Malware-Infested Charger

    During the annual Black Hat security conference later in July, researchers from the Georgia Institute of Technology will be showing off a prototype wall charger that they say is capable of installing malware onto iOS devices when plugged into the wall and connected to a device at the same time, which they found the results to be quite “alarming.”
    Read More
  • June 03 2013 | CNET UK

    iPhone Can Be Hacked Via Fake Charger, Researchers Say

    That's the question asked by researchers from the Georgia Institute of Technology, who'll be showing off a concept malicious charger at the Black Hat 2013 hacker conference in July, Forbes spied.
    Read More
  • June 03 2013 | AppAdvice

    Your iDevice Can Be Hacked In Just Under a Minute With Just a Modified Charger

    The researchers are set to demonstrate their proof-of-concept charger at the next Black Hat security conference, scheduled to be held from July 27 to Aug. 1 at the Caesars Palace in Las Vegas
    Read More
  • June 03 2013 | Cult of Mac

    Modified Charger Can Install Malware Onto Your iOS Device

    The prototype charger, which has been named “Mactans,” will be shown off at the Black Hat security conference in late July, and although the researchers behind it don’t want to share the details behind the hack just yet, they have provided some information in a description of their talk published on the conference website.
    Read More
  • June 03 2013 | The Next Web

    Researchers Claim They've Built a Modified Charger That Can Hack Your iPhone 'Within One Minute'

    Billy Lau, Yeongjin Jang and Chengyu Song are expected to debut the charger at Black Hat, a long-running security conference to be held in Las Vegas this July and August.
    Read More
  • June 03 2013 | Geeky Gadgets

    Researchers Hack iPhone With Modified Charger in Less Than A Minute

    Exact details of the hack are still unknown at the moment but the method will be demonstrated at the Black Hat security conference in late July, and will be presented by Billy Lau, Yeongjin Jang and Chengyu Song.
    Read More
  • June 03 2013 | Know Your Mobile India

    Modified Charger Used to Hack iOS Device Within A Minute

    The Black Hat Security Conference, scheduled in July, will witness three researchers demonstrating the charger that they claim can be used to install malware on any iOS device.
    Read More
  • June 03 2013 | Hot Hardware

    Researchers Discover iPhone Hack via Malicious Charger Exploit

    They plan to present their hack at the Black Hat security conference later this summer. In the meantime, they're keeping most of the details to themselves, though they did reveal that it's based on the open-sourceBeagleBoard by Texas Instruments, a $45 PC similar to the Raspberry Pi.
    Read More
  • June 03 2013 | PCR Online

    Researchers Build Decoy Charger Capable of Hacking iPhone

    Set to be showcased by the team at the Black Hat security conference next month, the charger is a result of the team's research, which aims to product a variety of hacking devices disguised as normal items.
    Read More
  • June 03 2013 | SC Magazine

    Black Hat Security Conference to Include 110 Talks

    When Black Hat's annual security conference rolls into Las Vegas at the end of July, event organizers promise one of the most "content-heavy" events yet.
    Read More
  • June 03 2013 | CNN

    Researchers: We Can Hack an iPhone Through the Charger

    The team says they have built a malicious charger named Mactans, which they plan to demonstrate at Black Hat. Latrodectus mactans is the scientific name for the deadly black widow spider.
    Read More
  • June 03 2013 | Business Insider

    Researchers Say They've Figured Out How to Hack Your iPhone Using a Charging Cord

    Georgia Institute of Technology researchers say they've figured out how to create an iPhone charger that can install bad software on the phone. They will present a proof-of-concept of the charger at the Black Hat security conference.
    Read More
  • June 03 2013 | CTV News

    Apple iOS Devices Hacked Using 'Malicious Charger,' Researchers Claim

    The researchers from Georgia Institute of Technology posted an outline for their presentation on the website for the Black Hat USA 2013 conference coming up at the end of July.
    Read More
  • June 03 2013 | The Telegraph

    Charger Can Hack Apple Devices with 'Alarming Ease,' Researchers Claim

    In a summary of their talk to be given at the Black Hat conference next, month, the three researchers say “In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger.
    Read More
  • June 03 2013 | UPI

    Researchers Describe Hacking iOS Devices with Malicious Charger

    Three researchers at the Georgia Institute of Technology said they would demonstrate a malicious charger at the upcoming Black Hat security conference in late July, Forbes reported Monday.
    Read More
  • June 03 2013 | PC Magazine

    Public Charging Stations Could Steal iPhone Data

    For this year's upcoming Black Hat conference, the abstract for one talk in particular has caught peoples' eyes. In it, researchers say they will demonstrate an innocuous-looking public charging station that can seize control of your iOS device.
    Read More
  • June 03 2013 | InfoSecurity Magazine

    Malicious Charger Can Compromise iPhone and iPad in Under One Minute

    At the upcoming Black Hat 2013 conference in July, Billy Lau, Yeongjin Jang and Chengyu Song will present their creation, dubbed Mactans after the black widow spider’s Latin name.
    Read More
  • June 03 2013 | TechNewsDaily

    How to Hack an iPhone With a USB Charger

    At next month's Black Hat security conference in Las Vegas, three Georgia Institute of Technology researchers will show how a USB-connected charger can silently install malicious code onto an iOS device.
    Read More
  • June 03 2013 | The Examiner

    Researchers Develop Method to Attack iOS via a 'Malicious Charger'

    The three researchers, from the Georgia Institute of Technology, plan on presenting their findings at this year's Black Hat security conference, which runs from July 27 - Aug. 1, in Las Vegas.
    Read More
  • June 03 2013 | International Business Times

    Apple iOS Hacked With Modified iPhone, iPad Charger

    "In evaluating this belief, we investigated the extent to which security threats were considered when performing everyday activities such as charging a device,” the researchers wrote in a blog post on the Black Hat conference event page, which will be held from July 27 to Aug. 1.
    Read More
  • June 03 2013 | The Mac Observer

    Researchers to Show How to Hack iPhone with USB Charger

    Billy Lau, Yeongjin Jang, Chengyu Songannounced the demonstration for Black Hat USA 2013, an annual conference for hackers and security researchers that begins on July 27th in Las Vegas.
    Read More
  • June 03 2013 | Daily Tech

    Hackers Install Malware on iPhone With Malicious Charger

    Researchers are preparing to unveil in a few months a new iOS exploit at the annual Black Hat security conference -- to be held Sept. 10-12 in Las Vegas, Nev.
    Read More
  • June 03 2013 | TechSpot

    Georgia Tech Researchers Hack iPhone with Malicious Wall Charger

    The announcement comes ahead of the Black Hat security conference scheduled for late July. The team from Georgia Tech has not released any details of their work, but plan to show off a proof-of-concept at the conference.
    Read More
  • June 03 2013 | The Inquirer

    iPhones Are Vulnerable to a Charger Security Attack

    Security researchers at the Blackhat security conference next month will demonstrate how they are able to hack into an iPhone using a modified power charger.
    Read More
  • June 03 2013 | Red Orbit

    Charging Stations Easily Hacks Into Apple's Famously Secure iPhone

    They’ll also be presenting their findings and demonstrating how their software works during this year’s Black Hat conference in Las Vegas.
    Read More
  • June 03 2013 | GEEK

    Any iPhone Can Be Hacked With a Modified Charger in Under a Minute

    Apple goes to great lengths to keep its iOS plaform secure, but a presentation at the upcoming Black Hat conference will point to the unassuming charging port as its greatest vulnerability.
    Read More
  • June 03 2013 | BetaBeat

    Malicious Charger Could Give Your iPhone an Electronically Transmitted Infection

    They’ll unveil the diabolical equipment at the Black Hat security conference from July 31 through Aug. 1 in Las Vegas.
    Read More
  • June 03 2013 | MacGasm

    Newly Created Malware Can Get At Your iPhone Through a Charger

    The group has announced they will reveal their findings at 2013’s Black Hat security conference as well as show off a proof-of-concept version of the charger.
    Read More
  • June 03 2013 | UberGizmo

    Modified Charger Can Hack Any iOS Device in One Minute

    The team will show off this hack and the modified charge at Black Hat security conference, which takes place in July. The team will explain more about how the hack functions at this conference.
    Read More
  • June 03 2013 | iTech Post

    Can Chargers Bring Malware to Your iOS Devices? If You Thought No, Think Again

    Researchers Billy Lau, Yeongjin Jang and Chengyu Song from the Georgia Institute of Technology, will demonstrate at the upcoming Black Hat security conference, from July 27 to Aug 1, how cybercriminals can insert malware into your iOS devices by using third-party malicious chargers.
    Read More
  • June 03 2013 | TechWeek Europe

    Researchers Plan to Hack an iPhone With a Malicious Charger

    Researchers claim they can hack an Apple iOS device with an easy-to-make charger that they plan to show off at the BlackHat conference next month.
    Read More
  • June 03 2013 | Forbes

    Researchers Say They Can Hack Your iPhone With A Malicious Charger

    At the upcoming Black Hat security conference in late July, three researchers at the Georgia Institute of Technology plan to show off a proof-of-concept charger that they say can be used to invisibly install malware on a device running the latest version of Apple’s iOS.
    Read More
  • June 02 2013 | The Inquisitir

    Specialized Apple iOS Charger Can Hack Devices in One Minute, Researchers Claim

    The product was created by a team of researchers at the Georgia Institute of Technology. The new device will show off a proof-of-concept during the Black Hat security conference in late July 2013.
    Read More
  • Mar 23 2013 | Security Blog EU

    Black Hat Europe 2013 Hacking (Polycom) Video Conferencing Systems

    Moritz Jodeit, ein Security Consultant der n.runs AG, hat sich mit der Sicherheit von Video Konferenz Systemen beschäftigt und seine Ergebnisse auf der BlackHat vorgestellt.
    Read More
  • Mar 15 2013 | Security Blog EU

    Black Hat Europe 2013: Secure Coding Workshop

    Nachdem ich den ganzen Morgen des ersten Tages immer die zu diesem Zeitpunkt gerade schlechteste Session ausgewählt hatte, war dieser Vortrag eine inhaltliche und unterhaltsame Wohltat für mich.
    Read More
  • Mar 14 2013 | Security Blog EU

    Black Hat Europe 2013: Keynote

    Die Keynote der Blackhat Europe 2013 wurde dieses Jahr von Rick Falkvinge gehalten. Er ist Mitglied der zwischenzeitlich in den meisten europäischen Staaten vertretenen Piraten Partei.
    Read More
  • Mar 14 2013 | MacFan

    Opgelet, zo veilig is die iPhone niet

    Je hebt niks te verbergen, maar je vertrouwt op de veiligheid van je iPhone, iPad en Mac. Vergeet het maar, is de boodschap op Black Hat Europe, de veiigheidsconferentie die zich deze week afspeelt in Amsterdam.
    Read More
  • Mar 11 2013 | Network World

    Black Hat Europe: 10 intriguing security briefings

    What could possibly go wrong having a bunch of hackers hunkering down in Amsterdam this week at Black Hat Europe 2013? We're afraid to speculate, but what should go right is that they're ready to present a lineup of briefings at this annual security event...
    Read More
  • Mar 10 2013 | Corlean Team

    Black Hat Europe 2013 – Preview

    There’s only a few days left until Black Hat Europe 2013 opens its doors in the beautiful city of Amsterdam, the Netherlands. Just like past years, I’ll be covering some of the briefings (semi) live on www.corelan.be.
    Read More
  • Mar 04 2013 | PR Newswire

    Black Hat Europe Happening March 12-15

    Black Hat Europe--Presented by Black Hat: the world's biggest and most important family of information security events.
    Read More
  • Feb 21 2013 | Financial Review

    Chinese hackers first exposed in 2011

    The Chinese military hacking group outed Monday for hacking into 141 companies in 20 industries since 2006 has been in the international headlines before. In August 2011 at the Black Hat cybersecurity conference in Las Vegas to be precise.
    Read More
  • Feb 20 2013 | Computerworld

    Does the latest Mac malware attack show that Windows 8 is more secure than Mac OS X?

    Security researchers have been saying the same thing about Windows 7 and Windows 8 -- both are more secure than Mac OS X. Security expert Alex Stamos of iSec Partners, for example, said at the Black Hat Conference in August 2011 that Mac OS X was "significantly more vulnerable" than Windows 7 to network-based attacks.
    Read More
  • Feb 15 2013 | CRN

    New Apple iPhone Hack Bypasses Passcode

    Dallas De Atley, Apple's manager of platform security, presented at the 2012 Black Hat conference in Las Vegas, which marked the first time that the software maker has ever spoken publicly about its products' security architectures and engineering processes.
    Read More
  • Jan 31 2013 | Dark Reading

    Hacking The Laptop Docking Station

    You know that docking station you snap your laptop into at the office? It can be hacked, too. A British researcher next month at Black Hat Europe will show just how valuable those seemingly benign devices can be to a determined attacker targeting an organization...
    Read More
  • Jan 23 2013 | Dark Reading

    Supply Chain Uncertainties Complicate Security

    In a talk at the Black Hat Security Conference in July, security researcher Jonathan Brossard demonstrated nearly undetectable functions that could hide in the firmware and be nearly impossible to remove.
    Read More
  • Jan 13 2013 | PR Newswire

    Rick Falkvinge to Keynote Black Hat Europe 2013

    Black Hat, the world's leading family of information security events today announces that Rick Falkvinge, the founder of the first Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013
    Read More
  • Dec 15 2012 | MSNBC

    Who's watching whom? Camera-equipped TV can be hacked, says researcher

    "Where do you have to be to attack? Over the Internet from China? Or on my local network?" asks Ford of the Black Hat organization. "I don't believe this is exploitable from anywhere but the local network. Judging from the video, they have to be on the local network on Wi-Fi or plugged in (via Ethernet)."
    Read More
  • 27 July 2012 | PCWorld

    Apple's AuthenTec Buy Shows Needed Focus on Mobile Security

    But the security of NFC-enabled phones remains an open question, as noted by security research consultant Charlie Miller during the Black Hat security conference that ended Thursday.
    Read More
  • 27 July 2012 | Androidpolice.com

    Security Researcher Demonstrates GPS Vulnerability That Could Let Hackers Track Users' Location, Take Over Phone

    Over at Black Hat USA 2012, security researcher Ralf-Phillip Weinmann demonstrated a vulnerability in several Android devices that utilized A-GPS to send illicit messages to the device…
    Read More
  • 27 July 2012 | InformationWeek

    Strike Back at Hackers? Get a Lawyer.

    That was the message from Robert Clark, an operations lawyer with the U.S. Army Cyber Command, in an address titled "Legal Aspects of Cyberspace Operations," on Thursday at the Black Hat conference
    Read More
  • 27 July 2012 | EnterpriseAppsToday

    SAP Hacked at Black Hat (Again)

    SAP applications could potentially be at risk from an emerging type of exploit known as Server Side Request Forgery (SSRF). That's the message coming from…Alexander Polyakov at this week's Black Hat
    Read More
  • 27 July 2012 | InformationWeek

    5 Black Hat Security Lessons For CIOs

    The Black Hat conference convenes in Las Vegas each year to discuss the latest hacks, cracks, and IT security fissures.
    Read More
  • 27 July 2012 | eWeek

    Microsoft 2012 Blue Hat Security Prizes Total $260,000

    A year ago at the Black Hat 2011 event, Microsoft announced the Blue Hat Prize. The goal is simple: It motivates security researchers to come up with a new defensive technology for Windows.
    Read More
  • 27 July 2012 | The Verge

    GPS Vulnerability Could Allow Hackers to Track, Take Over Smartphones

    A GPS weakness could allow hackers to remotely track smartphone users, or even completely take over mobile devices, University of Luxembourg researcher Ralf-Phillip Weinmann reported…at Black Hat.
    Read More
  • 27 July 2012 | CNNMoney

    How All Your iPhone Apps Could be Hacked At Once

    "Security is now an afterthought for many app developers," said Jonathan Zdziarski, senior forensic scientist at viaForensics, in a presentation at the Black Hat cybersecurity conference
    Read More
  • 27 July 2012 | iol.co.za

    'Everything You Do is At Your Own Risk'

    Cyprus-based Andrei Costin demonstrated his findings at a Black Hat gathering of cyber defenders that ends on Thursday in Las Vegas.
    Read More
  • 27 July 2012 | InformationWeek

    Mass Router Infection Possible: Black Hat

    Routers, switches, printers, firewalls, and other network-attached hardware can be automatically targeted..That was the takeaway from the…session Thursday at the Black Hat.
    Read More
  • 27 July 2012 | Mother Nature Network

    Apple Pitches Gadget Security to Hacker Crowd

    The unprecedented talk by Apple head of software platform security Dallas De Atley at the 15th annual Black Hat conference in Las Vegas came as hackers increasingly target smartphones…
    Read More
  • 27 July 2012 | CRN

    FishNet Security Researchers to Release Testing Tool Apps

    Researchers from FishNet Security are preparing to launch an automated security testing tool for iOS apps, and on Thursday they gave Black Hat security conference attendees a sneak preview.
    Read More
  • 27 July 2012 | z6mag.com

    Android, Nokia Phone Vulnerable to NFC Attacks

    "NFC attacks are really hard to test," said Miller at the Black Hat conference. "The biggest takeaway is before you push a webpage to me or something, for God's sake, give me the option to say no."
    Read More
  • 27 July 2012 | bcs.org

    Businesses and Governments Urged to Go on the Data Security Offensive

    Speaking at…Black Hat…the former head of the FBI's respected cyber crime unit warned both corporations and governments that simply boosting their online defenses will not be enough.
    Read More
  • 27 July 2012 | Wall Street Cheat Sheet

    Is Apple Accepting Its Security FLAWS?

    …Dallas De Atley will speak at the Black Hat conference in Las Vegas this week, marking the company's first official appearance at the security failures-focused event.
    Read More
  • 27 July 2012 | The Sydney Morning Herald

    Companies, Governments Urged to go on the Offense to Defense Cyberspace

    The first day of briefings at the prestigious Black Hat computer security gathering in Las Vegas opened with a former FBI cyber crime unit chief calling for a shift from defense to offence…
    Read More
  • 27 July 2012 | The West Australian

    Apple Pitches Gadget Security to Hacker Crowd

    The unprecedented talk by Apple head of software platform security Dallas De Atley at the 15th annual Black Hat conference in Las Vegas came as hackers increasingly target smartphones…
    Read More
  • 27 July 2012 | O'Reilly Radar

    Commerce Weekly: Square Disrupts, PayPal Shrugs

    Research consultant Charlie Miller demoed the security gaps at the Black Hat security conference in Las Vegas this week.
    Read More
  • 27 July 2012 | SecurityWeek

    PhishMe Lands $2.5 Million to Help Employees Recognize Evil Emails

    Just in time to throw a poolside Cabana party at the Black Hat conference, Chantilly, Virginia-based PhishMe Inc…today announced that it has closed a $2.5 million Series A funding round…
    Read More
  • 26 July 2012 | SecurityWeek

    Black Hat: Smart Meter (In)Security Spotlighted in Talk

    Six months after calling off his talk at another security conference, researcher Don C. Weber stepped in front of an audience at the Black Hat conference in Las Vegas.
    Read More
  • 26 July 2012 | SecurityWeek

    Black Hat Survey: More than 1/3 Have Engaged in Retaliatory Hacking

    In a poll of 181 attendees of the Black Hat USA 2012 conference in Las Vegas, nCircle asked "Have you ever engaged in retaliatory hacking?"
    Read More
  • 26 July 2012 | M-unition

    Black Hat 2012 Podcast: Practical Malware Analysis

    In our latest M-Unition Podcast, Mandiant's Kristen Cooper sat down with Michael Sikorski and Andy Honig at Black Hat 2012 in Las Vegas.
    Read More
  • 26 July 2012 | SecurityWeek

    Black Hat: Ex-FBI Agent Tells Private Sector to "Step it Up"

    Corporate America can apply those lessons to protect the networks from cyber-attackers, a former official told attendees at Black Hat
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat Video: Threats Surrounding Advanced Metering Infrastructure

    In this Black Hat 2012 press conference video, Don Weber, hardware analysis expert at InGuardian, discusses the threats involved with advanced metering infrastructure.
    Read More
  • 26 July 2012 | PCWorld

    Card Game Turns You Into a White Hat Hacker

    The game, funded in part by Intel Labs and the National Science Foundation, is making its debut at the Black Hat security conference in Las Vegas this week.
    Read More
  • 26 July 2012 | h.online.com

    Google's anti-malware bouncer too tolerant

    Bouncer only kicked in once they pushed their experiment into high gear and dropped all pretence of subtlety. The researchers presented their findings at the Black Hat: information security conference
    Read More
  • 26 July 2012 | 10 News.com

    Your Future Home is Vulnerable to Cyberattacks

    In a briefing at the Black Hat cybersecurity conference in Las Vegas on Wednesday, security researcher Collin Mulliner showed just how easily hackers can tap into "smart home" gadgets…
    Read More
  • 26 July 2012 | eSecurityPlanet

    Black Hat: Apple Outlines iOS Security

    Security vulnerabilities in Apple products have been frequent topics of discussion at Black Hat conferences for many years…
    Read More
  • 26 July 2012 | ThreatPost

    From Three Nations and Three Different Perspectives, Blue Hat Finalists Focus on Defense

    A year ago following the announcement of the contest at the Black Hat security conference, a good friend from his hacking team told him to play to his strengths.
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Researchers Talk Alternative Web Tracking Techniques

    There are many ways to track users across the web, but they all behave differently to cope with privacy limitations, a security researcher said Wednesday at the Black Hat conference in Las Vegas.
    Read More
  • 26 July 2012 | dailygossip.com

    Hackers Found New Ways to Attack Your Android Phone

    What other better way to pick hackers' brains than at a Black Hat convention? During such an event, hackers found new ways to attack your Android phone using NFC features.
    Read More
  • 26 July 2012 | SearchSecurity

    Black Hat 2012: Poor Mobile App Security Drains Enterprise Data

    Guerra, who is attending the 2012 Black Hat Briefings this week, said enterprise CISOs often set mobile policies without knowing the risks posed by legitimate mobile business applications.
    Read More
  • 26 July 2012 | thedroidguy.com

    Apple Warms up to Hackers- Plans Presentation at Black Hat

    Black Hat conference is a gathering of computer hackers, which has been going on for the past 15 years.
    Read More
  • 26 July 2012 | v3.co.uk

    Black Hat: Neal Stephenson Talks Up Bletchley Park

    Speaking at the Black Hat conference, author Neal Stephenson explained how the facility's work in breaking the German Enigma code helped to plant the seed that would become his hit novel "Cryptonomicon."
    Read More
  • 26 July 2012 | RedOrbit

    Hacker Targets NFC to Take Over Android Smartphones

    It's no surprise that the hacking experts at this year's Black Hat conference in Las Vegas would demonstrate a few of their tips and tricks on breaking into "secure" Android smartphones.
    Read More
  • 26 July 2012 | Financial Times

    Backdoors Expose Systems to Cyber Attacks

    The extent of the security crisis sweeping through the industrial controls landscape has been on display this week at the Black Hat conference in Las Vegas…
    Read More
  • 26 July 2012 | Live Science

    Hackers Break Iris Scanner Security

    Tests with the synthetic images fooled a commercial iris scanner about 80 percent of the time, researchers said at the Black Hat security conference in Las Vegas.
    Read More
  • 26 July 2012 | Network Computing

    Those Free Mobile Apps May Come at a Price: The Latest BYOD Threat

    New research out at Black Hat this week shows how seemingly benign apps can sneak their way onto corporate devices through consumer and even enterprise app stores.
    Read More
  • 26 July 2012 | eSecurity Planet

    Securing the Black Hat Wi-Fi Network

    With over 6,000 attendees, the Black Hat Wi-Fi network is one of the most hostile networks on Earth.
    Read More
  • 26 July 2012 | Beta News

    5 Ways to Put Hackers on the Defense

    Black Hat keynote speaker Shawn Henry, the former executive assistant director of the FBI's Criminal, Cyber, Response and Service Branch, started off the day after opening remarks from Jeff Moss…
    Read More
  • 26 July 2012 | InformationWeek

    FAA's New Flight Control System Has Security Holes: Researcher

    A key component of the FAA's emerging "Next Gen" air traffic control system is fundamentally insecure…security researcher Andrei Costin said in a presentation Wednesday at Black Hat
    Read More
  • 26 July 2012 | Government Technology

    Modern Cyberwar Requires Offensive Tactics, Says Ex-FBI Official

    That was the gist of Henry's keynote speech Wednesday, July 25, at the annual Black Hat security conference in Las Vegas
    Read More
  • 26 July 2012 | The Daily Star- Lebanon

    Apple Pitches Gadget Security to Hacker Crowd

    The unprecedented talk by Apple head of software platform security Dallas De Atley at the 15th annual Black Hat conference in Las Vegas came as hackers increasingly target smartphones…
    Read More
  • 26 July 2012 | The Register

    Neal Stephenson on Swordplay, Space and Depressing SF

    Renowned science fiction author Neal Stephenson has given his first keynote address at the Black Hat conference in Las Vegas…
    Read More
  • 26 July 2012 | Technology Review

    Fighting Hackers Without Sinking to Their Level

    companies need to consider their options for striking back at attackers, attendees of the annual Black Hat computer security conference in Las Vegas heard yesterday.
    Read More
  • 26 July 2012 | CRN

    Are the Skies Safe? Black Hat Speaker Says No.

    The bad news is that anyone with a few hundred dollars could hack the system, independent security researcher Andrei Costin said in a presentation Wednesday at the Black Hat conference in Las Vegas.
    Read More
  • 26 July 2012 | Naked Security

    Black Hat- SexyDefense, Maximizing the Home-Field Advantage

    I'm attending the Black Hat this year, and one of the most interesting and controversial talks so far was "SexyDefense - Maximizing the home-field advantage" by Iftach Ian Amit.
    Read More
  • 26 July 2012 | PC Magazine

    Black Hat: 5 Security Lessons From an Ex-FBI Official

    There is a lot private sector companies can learn from the Federal Bureau of Investigation when it comes to beefing up their security defenses, a former official told attendees at Black Hat…
    Read More
  • 26 July 2012 | Sic-Tech Today

    Activist Attacks Grow, Governments Get in on the Action

    This rising tide of denial-of-service attacks -- in support of divergent motives -- has surfaced as a hot topic at Black Hat security conference being held [in Las Vegas] this week at Caesars Palace.
    Read More
  • 26 July 2012 | Chicago Tribune

    Hacking Experts Find New Ways to Attack Android Phones

    Experts showed off their prowess at the Black Hat hacking conference in Las Vegas, where some 6,500 corporate and government security technology workers gathered to learn about emerging threats to their networks.
    Read More
  • 26 July 2012 | PC Advisor

    All Eyes on Apple With It Set to Take Security Public

    Anticipation was high Wednesday among Black Hat attendees awaiting Apple's first public appearance at the security conference under way this week in Las Vegas.
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Most Java malware exploits "type confusion" vulnerability

    Java malware targets certain types of vulnerabilities, and "type confusion" is the most common class being exploited, Jeong Wook Oh, a Microsoft researcher, told attendees Thursday at Black Hat…
    Read More
  • 26 July 2012 | SecurityWeek

    Smashing the Future: A Look Back, and the Future of Security

    The panelists had all spoken at the original Black Hat conference in 1997 and were reunited in this session to discuss what had happened in security over the years…
    Read More
  • 26 July 2012 | Mobilesyrup.com

    NFC-Based Android Hacks Open Up Devices to Remote Takeover

    This flaw in the Android browser was revealed during the Black Hat security conference in Las Vegas…
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Biometics Experts Reverse-Engineer Iris Scanning Systems to Create Clones

    At this year's Black Hat conference in Las Vegas, Javier Galbally…reveals ways for cyber criminals to thwart iris scans by duplicating an image of the eye membrane.
    Read More
  • 26 July 2012 | EmailHosting

    Email Hosting Vulnerabilities Heightened with Improvements in Web Exploit Kits

    HP's Jason Jones plans to discuss the vulnerabilities at the Black Hat show on Friday.
    Read More
  • 26 July 2012 | CNNMoney

    Fending Off Cybercriminals—For Kids!

    Adam Shostack, a Microsoft security program manager and collaborator…proclaimed at the Black Hat cybersecurity conference on Wednesday…
    Read More
  • 26 July 2012 | CNNMoney

    Your Future Home is Vulnerable to Cyberattacks

    In a briefing at the Black Hat cybersecurity conference in Las Vegas on Wednesday, security researcher Collin Mulliner showed just how easily hackers can tap into "smart home" gadgets…
    Read More
  • 26 July 2012 | The Verge

    Researchers Create Synthetic Iris That Can Defeat Eye-Scanning Security Systems

    Galbally presented his team's work at yesterday's Black Hat security conference…
    Read More
  • 26 July 2012 | SiliconAngle

    Apple Claims Samsung Overpriced Licensing Fees

    At the Black Hat convention, security specialist Charlie Miller demonstrated how NFC can be used to attack smartphones or acquire personal information.
    Read More
  • 26 July 2012 | androinica.com

    Black Hat Hackers Show off Android Vulnerabilities in NFC and Google Play Store

    At the Black Hat conference in Las Vegas, hackers demonstrated multiple ways in which they could take advantage of those vulnerabilities and compromise an Android device.
    Read More
  • 26 July 2012 | Androidcentral.com

    Android NFC 'Hacking' is Ingenious, but Not Yet Dangerous

    Multiple sources report that security researcher Charlie Miller demonstrated a variety of techniques for hacking into the Nexus S, the Galaxy Nexus and the Meego-powered Nokia N9 at Black Hat…
    Read More
  • 26 July 2012 | ITProPortal

    New App for Galaxy S3 Offers End-to-End Hotel Services to Olympic Guests

    Mozilla software developer Cody Brocious demonstrated the open-source hardware gadget at the Black Hat security conference in Las Vegas on Tuesday
    Read More
  • 26 July 2012 | CTOVision.com

    Top Officers Say Sequestration Threatens Cybersecurity, the VA Considers Mobile Contracts for All Employees, and More

    researcher at the Black Hat conference demonstrated security gaps that allowed him to insert fake airplanes into the Federal Aviation Administration's new ADS-B system.
    Read More
  • 26 July 2012 | Technobuffalo.com

    Rakshasa: Undetectable and Incurable Malware

    Preventing, detecting and removing malware is already time consuming and financially costly, however Jonathan Brossard plans to present a paper, at this year's Black Hat security conference…
    Read More
  • 26 July 2012 | GCN

    Ex-FBI Cyber Sleuth: Government 'Gets it,' But It Will Take Time

    "Intelligence is the key to all of this," Henry said July 25 at the Black Hat Briefings.
    Read More
  • 26 July 2012 | Technology Review

    Mobile Payment Chips Could Let Hackers into Your Phone

    a packed room at the Black Hat computer security conference in Las Vegas yesterday, an Android smartphone was tapped with a white plastic card, and within seconds it was running malicious code…
    Read More
  • 26 July 2012 | PC Magazine

    Looking into the Eye of the Meter

    His Black Hat presentation described in detail how he reverse-engineered smart meter technology, what criminals might do with that knowledge, and what protections are available.
    Read More
  • 26 July 2012 | PC Magazine

    Three Questions for Mario Vuksan

    Mario Vuksan …With co-founder Tomislav Pericin he presented a new tool for virus disinfection at the Black Hat conference this morning.
    Read More
  • 26 July 2012 | SearchSecurity

    Black Hat 2012: Phishing and Social Engineering Penetrating Testing

    In an interview with SearchSecurity.com conducted at the2012 Black Hat Briefings, Belani…said sustained anti-social engineering training can help heighten the security awareness of end users
    Read More
  • 26 July 2012 | Mobile.BLORGE

    NFC Security Questions

    It's time once again for the Black Hat security conference in Las Vegas and, as usual, Charlie Miller has popped up to show off the latest flaw he's discovered in popular technology.
    Read More
  • 26 July 2012 | v3.co.uk

    Black Hat: Hacking Guru Reveals NFC Smartphone Hacking Tricks

    The Accuvant Labs research consultant showed attendees at the Black Hat conference a pair of demonstrations in which an attacking device could access a targeted handset and remotely execute files…
    Read More
  • 26 July 2012 | ArsTechnica

    Spoofing a Microsoft Exchange Server: A New How-To

    At the Black Hat security conference in Las Vegas, the researcher at Edith Cowan University's Security Research Institute in Australia described an attack he said works against many Exchange servers…
    Read More
  • 26 July 2012 | CNN

    Researcher: New Air Traffic Control System is Hackable

    Computer scientist Andrei Costin, a Ph.D. student at Eurecom, gave a talk on the weaknesses of the new air traffic system at the Black Hat security conference in Las Vegas on Wednesday.
    Read More
  • 26 July 2012 | The Register

    Stuxnet: 'Moral Crime' or Proportionate Response?

    Delegates at the Black Hat conference in Las Vegas are sharply split on the merits (or otherwise) of malware like Stuxnet that can be used offensively to take down infrastructure.
    Read More
  • 26 July 2012 | eWeek

    Security Products That Fend Off Network Attacks Demonstrated at Black Hat

    Security software company FireMon applies network monitoring in its Security Manager 6.0, released in June and demonstrated at Black Hat.
    Read More
  • 26 July 2012 | decryptedtech.com

    Charlie Miller Shows Off How Dangerous NFC Can Be At Black Hat

    The Black Hat conference is happening right now in Sin City and already there is news coming out of the gather that should send chills down the spine of many smartphone owners.
    Read More
  • 26 July 2012 | eSecurity Planet

    Security Flaws Found in ADS-B Air Traffic Control System

    At Black Hat 2012, researcher Andrei Costin recently warned that the FAA's new air traffic control system is easily hackable.
    Read More
  • 26 July 2012 | eSecurity Planet

    Hacker Demos Security Flaw in Hotel Room Locks

    At Black Hat 2012, hacker Cody Brocious recently demonstrated a method of opening hotel room key card locks manufactured by Onity…
    Read More
  • 26 July 2012 | phandroid.com

    Hacking Conference Exposes Multiple Android Security Holes- Play Store, NFC and Old Versions of Android Vulnerable

    Last night, we told you guys about a security hole in Android that was to be revealed at a security conference called Black Hat 2012…
    Read More
  • 26 July 2012 | Technology Review

    Google Approves an App that Steals All Your Data

    The system repeatedly scanned but let pass an app that stealthily steals personal data such as photos and contacts, reported two researchers from computer security company Trustwave at… Black Hat…
    Read More
  • 26 July 2012 | Daily Disruption

    Black Hat Survey: Have You Ever Engaged in Retaliatory Hacking?

    nCircle, a leader in information risk and security performance management solutions, today announced the results of a survey of 181 attendees of the Black Hat USA 2012 security conference in Las Vegas
    Read More
  • 26 July 2012 | v3.co.uk

    Black Hat: Businesses at Risk From Over-Reliance on Automated Tools, Researchers Warm

    Businesses are at risk from IT threats because too many of them rely on automated tools, rather than highly-trained security staff. That was the conclusion of a group of researchers at the Black Hat…
    Read More
  • 26 July 2012 | The Mac Observer

    Apple Excited to Attend Black Hat, But Answers No Questions

    Dallas De Atley told the audience at his company's first-ever presentation at the Black Hat USA 2012 security conference that Apple was "really excited" to be there…
    Read More
  • 26 July 2012 | CNET

    Pen and Sword Equally Mighty for Science Fiction's Stephenson

    It's been a double-whammy of stardom for the attendees of the 15th annual Black Hat USA conference.
    Read More
  • 26 July 2012 | SC Magazine

    Apple iOS Black Hat Talk Had Bark But No Bite

    Apple's much-ballyhooed first-ever talk at the Black Hat conference lacked any of the fireworks that the standing-room only crowd had been hoping for.
    Read More
  • 26 July 2012 | VentureBeat

    Apple Talks About Securing iOS Devices in Rare Black Hat Appearance

    The company's head of platform security, Dallas De Atley, spoke at the annual Black Hat security conference in Las Vegas today…
    Read More
  • 26 July 2012 | CRN

    Apple Gets Philosophical About iOS Security in First Black Hat Appearance

    Apple made its first official appearance at the Black Hat security conference in Las Vegas Thursday…
    Read More
  • 26 July 2012 | Redmond Magazine

    Black Hat: Will Windows 8 Be a Hacking Killjoy?

    Windows is about to get a lot less fun to hack. That's one upshot of a talk given by security professionals Chris Valasek and Tarjei Mandt at this week's Black Hat USA Briefings in Las Vegas.
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Researchers Find Way to 'Bounce' Malware into Google App Store

    They circumvented Bouncer, an automated scanner, with a JavaScript trick that transformed a benign Android app into a malicious one on Google Play, Nicholas Percoco…told attendees at Black Hat…
    Read More
  • 26 July 2012 | CNNMoney

    NFC (Near Field Communications) Exploit: Be Very, Very Careful What Your Smartphone Gets Near

    Miller set the Black Hat cybersecurity conference buzzing on Wednesday with a presentation showing off newly discovered vulnerabilities in "near field communications" features…
    Read More
  • 26 July 2012 | International Digital Times

    NFC Exploit Revealed in Black Hat Conference Demonstration

    The NFC capabilities of your smartphone… may be causing a huge security risk to your smartphone according to Black Hat Security.
    Read More
  • 26 July 2012 | ThreatPost

    In First Black Hat Talk, Apple Reveals Little New About iOS Security

    An odd thing happened at Black Hat on Thursday: an Apple security official gave a talk.
    Read More
  • 26 July 2012 | Technology Review

    GPS Weakness Could Enable Mass Smartphone Hacking

    Ralf-Philipp Weimann, a researcher at the University of Luxembourg, reported this finding at the Black Hat computer security conference in Las Vegas yesterday.
    Read More
  • 26 July 2012 | ITWorld

    Flame's Windows Update Hack Wins Pwnie Award for Epic Ownage at Black Hat

    The judging panel of the Pwnie Awards, which are handed out every year at the Black Hat security conference for achievements and failures in IT security, have recognized the Windows Update hack…
    Read More
  • 26 July 2012 | SearchSecurity

    Black Hat 2012: Apple Tech Talk a Missed Opportunity, Researchers Say

    The presentation by Dallas De Atley… at the 2012 Black Hat Briefings conference, marked the first time the Cupertino, Calif.-based company has ever spoken publicly about its products' security…
    Read More
  • 26 July 2012 | SlashGear

    Apple 'Really Excited' to be at Black Hat

    We've already had a few stories about the 15th annual Black Hat conference in Las Vegas, but now it's time to tell you about Apple's role in the meeting.
    Read More
  • 26 July 2012 | PC Magazine

    Windows 8 Much More Secure than Windows 7

    At the Black Hat conference they reported on their analysis of new low-level security features in Windows 8.
    Read More
  • 26 July 2012 | InfoWorld

    Slow Patching Puts Android Users at Further Risk

    If Android users weren't already feeling a bit paranoid about the growing security threats to their mobile platform, they might after hearing some of the news coming out of Black Hat USA 2012.
    Read More
  • 26 July 2012 | eWeek

    Windows 8 Security Garners Praise at Black Hat

    However, in a new report released at the Black Hat conference here, engineers at Microsoft have done an admirable job of defending memory…
    Read More
  • 26 July 2012 | CNNMoney

    Hackers' Next Target: Your Eyeballs

    At the Black Hat cybersecurity conference in Las Vegas on Wednesday, Javier Galbally, a researcher at the Universidad Autonoma of Madrid, Spain, showed how his team did it.
    Read More
  • 26 July 2012 | ThreatPost

    Threat to U.S. Government and Businesses 'Deep and Broad', Expert Says

    An intense former top FBI official, Henry is here not just to deliver speeches at Black Hat and DEF CON, but to deliver a larger message to the security professionals…
    Read More
  • 26 July 2012 | Channelnomics.com

    RSA Service Detects Rogue Mobile Apps

    The tool, officially released at the Black Hat Security Conference this week, could give partners an easy way to approach customers about their mobile security posture
    Read More
  • 26 July 2012 | Nextgov.com

    Discovery Highlights How Malware Goes Undetected

    Paul Royal, a research scientist on the Georgia Tech team, plans to unveil the work at the security conference, Black Hat, in Las Vegas this week.
    Read More
  • 26 July 2012 | GCN

    New Tool Spots Hacking Vulnerabilities in Smart Meters

    Researchers probing the security of smart-grid technology presented their results at the Black Hat Briefings, and released a tool to help spot vulnerabilities in new smart meters.
    Read More
  • 26 July 2012 | TravelersToday.com

    Hotel Rooms Can be Opened Without Key Cards

    The details about the claims will be revealed at the Black Hat conference in Las Vegas this week.
    Read More
  • 26 July 2012 | Bloomberg

    Apple's Black Hat Talk Draws Crowd, but Breaks Little Ground

    Black Hat is one of the hacking community's premier forums for researchers to present their findings and for companies whose products are targets to outline the steps they're taking to improve security
    Read More
  • 26 July 2012 | CMSWire

    Using Web Tracking to Track Down Hackers #blackhat

    This was the theme of Web Tracking for You, a session at the tenth Black Hat security conference in Las Vegas presented by Gregory Fleischer.
    Read More
  • 26 July 2012 | PC Magazine

    Striking Back at Polymorphic Threats

    At the Black Hat conference Mario Vuksan and Tomislav Pericin, co-founders of Reversing Labs, presented a new tool to fight these threats, the File Disinfection Framework (FDF).
    Read More
  • 26 July 2012 | ComputerWeekly.com

    BlackHat 2012: UK Firm MWR Infosecurity Reveals Chip and PIN Vulnerability

    Researchers from Basingstoke-based MWR InfoSecurity demonstrated at the 2012 Black Hat conference in Las Vegas that it is possible to attack chip and PIN devices…
    Read More
  • 26 July 2012 | TechWeek Europe

    Bank-Theft Botnet Gameover Infects 700,000 Systems

    Security researchers revealed at the Black Hat security conference that a peer-to-peer botnet has infected more than 675,000 systems, including those at 14 of the top-20 Fortune 500 companies.
    Read More
  • 26 July 2012 | Wired

    Air Traffic Controllers Pick the Wrong Week to Quit using Radar

    This is the kind of spoofing attack that could become possible, according to security researcher Andrei Costin, who spoke at the Black Hat security conference on Wednesday…
    Read More
  • 26 July 2012 | Dark Reading

    Simplifying SQL Injection Detection

    This week at Black Hat, a researcher released a new tool to embed in applications that makes that detection process easier.
    Read More
  • 26 July 2012 | v3.co.uk

    Black Hat: Researchers Share the Joys of 'Breaking Things'

    The increasing willingness of vendors to work with security researchers is making the process of reporting vulnerabilities easier, according to a panel of Black Hat presenters.
    Read More
  • 26 July 2012 | InformationWeek

    Mahdi Malware Makers Push Anti-American Update

    "I think it was a mistake," said Aviv Raff, CTO of Israel-based Seculert, in an interview at Black Hat 2012 in Las Vegas.
    Read More
  • 26 July 2012 | CSO

    All Eyes on Apple With It Set to Take Security Public

    Anticipation was high Wednesday among Black Hat attendees awaiting Apple's first public appearance at the security conference under way this week in Las Vegas.
    Read More
  • 26 July 2012 | The Register

    Kaminsky Takes on Censorship with Info-Mapping Tools

    the tool was difficult to install and use and lacked wide support, he acknowledged in his presentation at this year's Black Hat conference in Las Vegas.
    Read More
  • 26 July 2012 | The Verge

    Possible Hole in Google Play's App Security Filter to be Demonstrated Tomorrow

    Trustwave's researchers are presenting their technique tomorrow at the Black Hat security conference…
    Read More
  • 26 July 2012 | TechWorld

    Google Bouncer Beaten at Black Hat 2012

    This week at the Black Hat Conference in Las Vegas, security firm Trustwave explained how it's possible to circumvent the Google Bouncer security check.
    Read More
  • 26 July 2012 | eWeek

    Black Hat: Credit Card Payment Terminals at Risk

    At the Black Hat security conference here, a pair of security researchers demonstrated in front of a live audience that those payment terminals are not as secure as they should be.
    Read More
  • 26 July 2012 | SC Magazine

    2012 Pwnie Awards—Winners Announced

    Held to coincide with the Black Hat conference in Las Vegas, the nominees were announced at the start of this week
    Read More
  • 26 July 2012 | CrazyEngineers.com

    Digital Iris That Looks Real Enough to Fool Biometric Scanners

    In the recently held Black Hat Security conference, a technique of recreating iris images using the digital codes essential for iris-scanning security protocols was shown…
    Read More
  • 26 July 2012 | Forbes

    Researchers Trick Iris Scanner with Forges Eye Images

    As the Black Hat 2012 security conference explores the ever-shifting cyber security battle… one of the more compelling developments to have come out of the event has been in the field of biometrics.
    Read More
  • 26 July 2012 | Device Magazine

    Hackers May Use NFC Feature to Attack Phones

    Security expert Charlie Miller has demonstrated the chinks in the technology at the ongoing Black Hat security conference at Las Vegas.
    Read More
  • 26 July 2012 | TechWeek Europe

    NFC Security Flaws in Android and Nokia N9 Phones

    Showing off his skills at the Black Hat security conference in Las Vegas, Miller, principal research consultant at security firm Accuvant, showed how his attack method could be used against NFC…
    Read More
  • 26 July 2012 | Inquirer

    Android Phones with NFC are Easy to Hack

    The Accuvant Labs research consultant showed attendees at the Black Hat conference a pair of demonstrations in which an attacking device could access a targeted handset and remotely execute files…
    Read More
  • 26 July 2012 | InformationWeek

    NFC Phone Hacking and Other Mobile Attacks

    One of the main tracks Wednesday at the Black Hat 2012 conference in Las Vegas was Mobile.
    Read More
  • 26 July 2012 | SlashGear

    Android and Nokia NFC Exploits Detailed at Black Hat

    The Black Hat security conference kicked off yesterday in Las Vegas, and one researcher has demonstrated an NFC exploit that affects Android and certain Nokia phones.
    Read More
  • 26 July 2012 | VR-Zone

    Black Hat Researcher Demonstrates Massive Security Flaws in NFC- Enabled Mobile Devices

    Chris Miller, a security researcher presenting his findings at the Black Hat security conference, has discovered some severe security flaws with the new Near Field Communications technology.
    Read More
  • 26 July 2012 | PC Advisor

    Researcher Wows Black Hat with NFC-Based Smartphone Hacking Demo

    the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9…
    Read More
  • 26 July 2012 | SearchSecurity

    Black Hat 2012: On-Stage NFC Hack Highlights NFC Security Issues

    Miller culminated nine months of research into NFC security issues this week at the 2012 Black Hat Briefings conference
    Read More
  • 26 July 2012 | ExtremeTech

    Black Hat Hacker Lays Waste to Android and Meego Using NFC Exploits

    A security researcher at the Black Hat conference in Las Vegas has demonstrated some gaping holes in the implementation of NFC on the Samsung Nexus S, Samsung/Google Galaxy Nexus, and Nokia N9.
    Read More
  • 26 July 2012 | PC World

    Microsoft Rools BlueHat Prize Finalist's Concept Into EMET 3.5

    Microsoft announced a new version of its EMET (Enhanced Mitigation Experience Toolkit) software at the Black Hat conference in Las Vegas.
    Read More
  • 26 July 2012 | v3.co.uk

    Black Hat: Microsoft Claims Blue Hat Anti-Hacking Campaign Set to Bear Fruit

    Introduced last year at the Black Hat conference in Las Vegas, Blue Hat challenged security researchers to work with Microsoft on developing new methods for spotting and removing malware and attacks.
    Read More
  • 26 July 2012 | Network World

    Black Hat: Microsoft Incorporates BlueHat Prize Finalist Defensive Tech & Releases EMET 3.5 Preview

    A year ago this week during the Black Hat security conference, Microsoft announced the BlueHat Prize and challenged the security community to think outside the box and focus on defensive innovation.
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Former FBI Top Cyber Cop Says Defenders Need to Think More Tactically

    Throughout his talk at the Black Hat conference in Las Vegas, Henry leaned on the fear card, sometimes referencing 9/11, the threat of cyber terror and the possible loss of life…
    Read More
  • 26 July 2012 | GCN

    Ex-FBI Cyber Sleuth: Government 'Gets it,' But It Will Take Time

    "Intelligence is the key to all of this," Henry said July 25 at the Black Hat Briefings.
    Read More
  • 26 July 2012 | RedOrbit

    Black Hat: Former FBI Director Calls for Soldiers Against Cybercrime

    The Black Hat conference kicked off in Las Vegas this week, bringing together all manner of hackers and security experts alike.
    Read More
  • 26 July 2012 | Computerworld

    Payment Terminal Flaws Shown at Black Hat

    The vulnerabilities were demonstrated Wednesday at the Black Hat USA 2012 security conference by MWR's head of research…
    Read More
  • 26 July 2012 | CSO

    #BlackHat2012: Schneier Warns of Major Loss of IT Control, but Some See Silver Lining

    At Black Hat yesterday I sat down with security luminary Bruce Schneier to discuss the current state of things…
    Read More
  • 26 July 2012 | onPoint

    A Trade Show For Hackers

    That's exactly what's happening only it's the world's best hackers and security men at what is called The Black Hat Conference.
    Read More
  • 26 July 2012 | SC Magazine

    Black Hat: Security Pros Must Evolve Their Defensive Strategy

    Security professionals must update and address their defensive strategies to be proactive against cyber threats, according to a researcher at the Black Hat conference.
    Read More
  • 26 July 2012 | TechWorld

    Black Hat Panel: Who Do You Trust Less, the US Government or Google?

    To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times…
    Read More
  • 26 July 2012 | TechCentral

    Chip-and-PIN Not Safe From Fraudsters

    Retail Chip-and-PIN devices can easily be attacked, exposing banks, retailers and consumers to serious fraud, a British security company has claimed at the Black Hat Security Conference…
    Read More
  • 26 July 2012 | IDG News Service

    Tools Released at Black Hat Contains 150 Ways to Bypass Web Application Firewalls

    A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday.
    Read More
  • 26 July 2012 | CNN

    Is the Government Doing Enough to Protect Us Online?

    At a lively panel discussion at the annual Black Hat security conference in Las Vegas on Wednesday, computer security experts discussed the roll of the government in online security.
    Read More
  • 26 July 2012 | eSecurityPlanet

    Black Hat: NFC: Equipped Smartphones Vulnerable to Attack

    In front of a capacity crowd at the Black Hat security conference here in Las Vegas, security researcher Charlie Miller detailed and demonstrated new vulnerabilities in NFC.
    Read More
  • 26 July 2012 | PC Magazine

    And Your 2012 Pwnie Award Winners Are…

    The Pwnies, Black Hat's tongue-in-cheek awards show celebrating the biggest achievements and failures of the security industry, concluded day one of Black Hat with lots of laughs.
    Read More
  • 26 July 2012 | V3.co.uk

    Black Hat: Apple Offers Rare Glimpse into iOS Security

    Apple used its first appearance at the Black Hat conference to provide an unprecedented under-the-hood look at the security practices it has built in to its massively popular iPad and iPhone devices.
    Read More
  • 26 July 2012 | SiliconRepublic

    Black Hat Speaker Shows how NFC Can Be Used for Malicious Attacks

    In a talk entitled 'Don't Stand So Close to Me: An Analysis of the NFC Attack Surface', security expert Charlie Miller has revealed the dangers of NFC technology in the wrong hands at Black Hat USA
    Read More
  • 26 July 2012 | New York Times

    From Black Hat: Hackers Demonstrate a Rising Vulnerability of Smartphones

    Charlie Miller, a security researcher at Accuvant and serial smartphone hacker, demonstrated how easy it is for hackers to exploit near-field communication technology to take control of devices remotely.
    Read More
  • 25 July 2012 | Security Heavy

    Henry Keynote Opens Black Hat with Flash Bang

    If President John F. Kennedy were alive and in attendance at Black Hat founder Jeff Moss' keynote welcome address, he would have been shaking his head in agreement with Moss.
    Read More
  • 25 July 2012 | SC Magazine

    Black Hat: Security Pros Must Evolve Their Defensive Strategy

    Security professionals must update and address their defensive strategies to be proactive against cyber threats, a researcher said Wednesday at the Black Hat conference in Las Vegas.
    Read More
  • 25 July 2012 | CSO

    #BlackHat2012: Global Hacking Increases in Q2, According to Report

    Like the RSA conference, Black Hat is a time when security vendors like to release news on their products and research.
    Read More
  • 25 July 2012 | Infosecurity Magazine

    Black Hat, Evader and the AET

    After long anticipation, StoneSoft introduced their new Evader tool at Black Hat, Las Vegas 2012…
    Read More
  • 25 July 2012 | TMCNet

    SSH Improves Data Loss Prevention for Encrypted Interactions with CryptoAuditor

    … for those not familiar with Black Hat, it is an annual gathering of the security industry's best and brightest…
    Read More
  • 25 July 2012 | SC Magazine

    App Detects Compromised, Jailbroken iOS Devices

    Speaking from Black Hat Las Vegas, Trail of Bits chief executive and co-founder Dan Guido said attacks on iOS devices were possible, but had not occurred because of the cost of exploitation.
    Read More
  • 25 July 2012 | Dark Reading

    Free Advanced Evasion Technique Tool Unleashed

    Stonesoft plans to demonstrate here at its booth at Black Hat how the tool allows it to bypass several network vendors' devices.
    Read More
  • 25 July 2012 | The Register

    Black Hat Draws World Hacking Gang- and Apple- to Sin City

    The 2012 Black Hat conference is kicking off in Las Vegas, and this year's session will see Apple presenting for the first time…
    Read More
  • 25 July 2012 | v3.co.uk

    Researchers Uncover New Mac Malware Attack

    Later this week, Apple researchers are gearing up to make the company's first ever formal presentation at the Black Hat security conference.
    Read More
  • 25 July 2012 | TG Daily

    Jacking Hotel Rooms with an Arduino Microcontroller

    Black Hat 2012 kicked off in Las Vegas with a bang as Mozilla software dev Cody Brocious talked about jacking and cracking hotel room doors with an Arduino microcontroller.
    Read More
  • 25 July 2012 | Phonereview.co.uk

    Apple Black Hat Security Conference Key Security Within iOS

    The company's security researchers have discreetly visited Black Hat and other conferences…
    Read More
  • 25 July 2012 | SearchSecurity

    Black Hat 2012: Dan Kaminsky Tackles Secure Software Development

    Dan Kaminsky's annual "black ops" talk Wednesday at the 2012 Black Hat Briefings conference was a departure from past years' presentations…
    Read More
  • 25 July 2012 | RedOrbit

    Apple Executive to Present at Black Hat Conference

    So, when Apple's platform security manager takes the stage at this year's Black Hat conference in Las Vegas to discuss "iOS Security," Apple will likely be walking into the lion's den…
    Read More
  • 25 July 2012 | SearchSecurity

    Black Hat 2012: Limited Release for Tool Allowing Smart Meter Hacks

    A hacking tool designed to target and control a smart meter is getting a controlled release following a presentation Wednesday at the 2012 Black Hat Briefings conference.
    Read More
  • 25 July 2012 | CNET

    Hacking, the Card Game, Debuts at Black Hat

    Game co-designer… said at the Black Hat 2012 confab here that when it comes to teaching ethical hacking, also known as white hat hacking, not enough educators "use carrots, not sticks."
    Read More
  • 25 July 2012 | Internetnews.com

    Black Hat: Pwnie Awards Go to Flame for Epic pwnage and F5 for Epic Fail

    One of the highlights for me in any given year of the Black Hat security conference is the Pwnie awards.
    Read More
  • 25 July 2012 | VentureBeat

    Forget Apps, Hackers Could use NFC to Get Access to Your Phone

    "NFC attacks are really hard to test," said Miller at the Black Hat conference. "The biggest takeaway is, before you push a webpage to me or something, for God's sake, give me the option to say no."
    Read More
  • 25 July 2012 | CNET

    Microsoft Implements BlueHat Prize Tech

    The name "BlueHat" is a reference to the Black Hat conference and Microsoft's corporate color of choice. It was first coined in 2005...
    Read More
  • 25 July 2012 | PC World

    Microsoft's Security Tool Includes Defenses Inspired by BlueHat Finalist

    The competition was launched at last year's Black Hat security conference in Las Vegas and closed on April 1, 2012.
    Read More
  • 25 July 2012 | Inquirer

    Microsoft Releases Anti Hacker Tool Using BlueHat Prize Winner Code

    The competition was launched at the Black Hat security conference in Las Vegas last year and closed in April.
    Read More
  • 25 July 2012 | PC Magazine

    Microsoft Implements Invention of BlueHat Finalist

    The contest was announced at last year's Black Hat conference; the $200,000 grand prize will be awarded tomorrow.
    Read More
  • 25 July 2012 | v3.co.uk

    Black Hat: Community Calls for Government Cooperation and Transparency

    The expert panel, which first convened at the Black Hat conference, debated the role government should take in addressing data security…
    Read More
  • 25 July 2012 | Gizmodo

    Air Traffic Control of the Future is (Still) Incredibly Hackable

    Two separate papers are being presented at the Black Hat and Defcon security conference this week detailing how vulnerable ADS-B is to such an attack.
    Read More
  • 25 July 2012 | v3.co.uk

    Black Hat: Former FBI Chief Urges Firms to Take Strategic Approach to Cyber Threats

    Speaking at the 2012 Black Hat conference in Las Vegas, former FBI executive assistant director Shawn Henry told delegates that firms can no longer approach security as a matter of protecting the network perimeter…
    Read More
  • 25 July 2012 | SC Magazine

    Black Hat: Assessing Smart Meters for Hacking Footprints, Vulnerabilities

    The tool allows for the assessment of the optical port… said in a press conference following his talk at the Black Hat conference in Las Vegas.
    Read More
  • 25 July 2012 | ThreatPost

    Charlie Miller Takes on NFC, Charlie Miller Wins

    He demonstrated the technique, along with another attack that leverages NFC, during a talk at the Black Hat conference here Wednesday.
    Read More
  • 25 July 2012 | eWeek

    RSA Research Unit Hunts Cyber-Threats 'That Don't Have Names'

    At the Black Hat 2012 conference taking place July 21-26 in Las Vegas, cyber-security firms are sharing information on how to keep up with rapidly evolving threats.
    Read More
  • 25 July 2012 | CNET

    Researcher Uses NFC to Attack Android, Nokia Smartphones

    Security specialist Charlie Miller demonstrated at the Black Hat security conference today a way to hijack an Android smartphone via the Near Field Communication (NFC) technology
    Read More
  • 25 July 2012 | MacNewsWorld

    Apple to Make Unprecedented Appearance at Black Hat

    Apple Platform Security Manager Dallas DeAtley is scheduled to speak at Black Hat 2012 Thursday about key security technologies in the company's mobile operating system, iOS.
    Read More
  • 25 July 2012 | Reuters

    Justice Department Mulls Actions to Disrupt Internet Spies: ex-FBI Official

    Henry disclosed the plan in an interview after a speech to the Black Hat security conference in Las Vegas in which he said 90 percent of attacks on U.S. companies and government agencies remain secret
    Read More
  • 25 July 2012 | eWeek

    'Gameover' Financial Botnet Compromises Nearly 700,000 Victims

    A peer-to-peer botnet has infected more than 675,000 systems, including those at 14 of the top 20 Fortune 500 companies, according to research released July 25 at the Black Hat security conference.
    Read More
  • 25 July 2012 | Internetnews.com

    Black Hat: Kaminsky Says that Developers, Not Security Pros are in Charge

    When it comes to security flaws, security pros are not in charge. That's the message that security researcher Dan Kamsinky, delivered in a press conference at Black Hat today.
    Read More
  • 25 July 2012 | TechNewsWorld.com

    Apple to Make Unprecedented Appearance at Black Hat

    Apple Platform Security Manager Dallas DeAtley is scheduled to speak at Black Hat 2012 Thursday about key security technologies in the company's mobile operating system, iOS.
    Read More
  • 25 July 2012 | SlashGear

    Former FBI Agent Urges Hackers to Help US Fend Off Cyber-Threats

    During his keynote at the Black Hat conference in Las Vegas today, former FBIagent Shawn Henry made a point of discussing cyber-threats and how the US government can defend against them.
    Read More
  • 25 July 2012 | SearchSecurity

    Black Hat 2012: Luminaries Worries About Social Engineering Techniques

    The panelists were chosen to participate by Black Hat conference planners because they all took part in the first Black Hat conference held in 1997.
    Read More
  • 25 July 2012 | Government Technology

    Control-Alt-Hack: Card Game Grabs Young Computer Scientists

    Imagine a Magic: The Gathering card game for aspiring cybersecurity pros. That's the idea of a new table-top card game centered around hacking and Internet security will be presented…at Black Hat
    Read More
  • 25 July 2012 | webpronews.com

    Electronic Locks Aren't Very Effective Against A Hacker

    Cody Brocious, a software developer at Mozilla, showed off his latest hack at the Black Hat Security Conference in Las Vegas.
    Read More
  • 25 July 2012 | SC Magazine

    Black Hat: Former FBI Top Cyber Cop Says Defenders Need to Think More Tactically

    … the former executive assistant director of the FBI told a standing-room only crowd during the keynote Wednesday at the Black Hat conference in Las Vegas.
    Read More
  • 25 July 2012 | CNET

    Watching the Crooks: Researcher Monitors Cyber-Espionage Ring

    In an interview at the Black Hat security conference here, Joe Stewart…said that over the last 18 months he's been monitoring attacks designed to steal data from organizations around the world.
    Read More
  • 25 July 2012 | Network World

    Black Hat: Cyber Espionage Operations Vast Yet Focused, Researcher Claims

    Cyber-espionage operations across the Internet are extensive yet highly targeted, says a malware researcher speaking this week at the Black Hat Conference in Las Vegas.
    Read More
  • 25 July 2012 | eWeek

    Former FBI Agent Warns of Cyber-Threat, Asks Hackers for Help at Black Hat

    "We need warriors to fight our enemies," Henry told the capacity Black Hat audience of more than 6,500 computer security professionals.
    Read More
  • 25 July 2012 | CNNMoney

    Former FBI Cyber Cop Worries About a Digital 9/11

    In his opening keynote Wednesday at Black Hat…Shawn Henry, the FBI's longtime top cybercrime official, cited the natural gas intrusion as an example of the escalating stakes of cybersecurity.
    Read More
  • 25 July 2012 | eSecurity Planet

    Black Hat: Wintel Flaw Remained Unpatched for Six Years

    Wojtczuk announced his findings at the Black Hat security conference here in Las Vegas.
    Read More
  • 25 July 2012 | ThreatPost

    Experts Say Better Security Rests on Cooperation, More Data

    a panel of security experts at Black Hat said that while defenses have gotten better, attackers have as well and there is a long way to go before defenders have the upper hand.
    Read More
  • 25 July 2012 | CRN

    Black Hat Attendees Expect Changes at Symantec Following Salem's Departure

    Much of the buzz in the hallways at the Wednesday morning session of Black Hat focused on the news that Symantec had dismissed CEO Enrique Salem and replaced him with chairman Steve Bennett…
    Read More
  • 25 July 2012 | InformationWeek

    Black Hat: 6 Lessons to Tighten Enterprise Security

    How can corporate America cure its information security ills? Take a page from the FBI's terrorism-combating revamp. That was the pitch made by Shawn Henry… in his keynote at Black Hat.
    Read More
  • 25 July 2012 | eWeek

    HP Security Expert: Exploit Kits More Sophisticated, Harder to Detect

    Jones is scheduled to give a presentation July 26 at the Black Hat 2012 show in Las Vegas, outlining his research into some of the more common Web exploit toolkits on the market…
    Read More
  • 25 July 2012 | Network World

    Card Game Turns You Into White Hat Hacker

    The game, funded in part by Intel Labs and the National Science Foundation, is making its debut at the Black Hat security conference in Las Vegas this week.
    Read More
  • 25 July 2012 | CRN

    Former FBI Exec: Public Needs to Recognize Cyber Attacks Pose Grave Threat

    Henry addressed a standing room only crowd of several hundred people Wednesday at the 15th annual Black Hat conference, under way in Las Vegas this week.
    Read More
  • 25 July 2012 | VentureBeat

    The Gov't Thinks You Should focus on the Adversary, but Who is the Adversary?

    Henry spoke at the Black Hat security conference in Las Vegas today and explained that one of the main problems with the security industry is the lack of focus on the enemy…
    Read More
  • 25 July 2012 | CNET

    Ex-FBI Agent Tells Hackers to 'Step Up' Against Cybersecurity

    Henry…told the crowd during the keynote presentation that started off the Black Hat security conference here. "Our failure to do so means people are going to get hurt and people are going to die."
    Read More
  • 25 July 2012 | GCN

    Windows 8: A Secure OS for Government

    Government agencies pondering whether to migrate to the latest version of the Windows operating system due out later this year got some good news from researchers at the Black Hat Briefings.
    Read More
  • 25 July 2012 | Computerworld

    Black Hat: Hotel Keycard Lock Picking in Less Time Than it Takes to Blink

    Tuesday night at the Black Hat security conference, Cody Brocious, a Mozilla software developer, presented My Arduino can beat up your hotel room lock.
    Read More
  • 25 July 2012 | Computerworld

    Microsoft Beefs Up Anti-Exploit Tool with Tech from $250K Contest Finalist

    Microsoft will announce the winners late Thursday at the Black Hat security conference, which kicked off today in Las Vegas and wraps up tomorrow.
    Read More
  • 25 July 2012 | Forbes

    Net-Gen Air Traffic Control Vulnerable to Hackers Spoofing Planes out of Thin Air

    Andrei Costin, a Ph.D. candidate at the French security institute Eurecom… plans to give a talk called "Ghosts In The Air (Traffic)" at Black Hat.
    Read More
  • 25 July 2012 | NFCWorld

    Security Researcher to Present on NFC at Black Hat

    Noted security researcher Charlie Miller is to present the findings from his research into NFC P2P and tag reading vulnerabilities at Black Hat 2012 today.
    Read More
  • 25 July 2012 | InformationWeek

    Evader Tool Shows Holes in Network Perimeter Security

    Tuesday at the Black Hat security conference in Las Vegas released a free testing tool that checks for attacks employing so-called advanced evasion techniques (AETs)…
    Read More
  • 25 July 2012 | Marketplace.org

    Is That Really Your Eye Under that Black Hat?

    The Black Hat hacking conference is taking place this week in Las Vegas.
    Read More
  • 25 July 2012 | ITwire.com

    Ready? Set? Control-Alt-Hack!

    To be presented by its creators at this week's Black Hat conference in Las Vegas, the game Control-Alt-Hack offers an educational opportunity to understand the methods and ethics of hacking.
    Read More
  • 25 July 2012 | Wired

    Reverse-Engineered Irises Look so Real, They Fool Eye-Scanners

    New research being released this week at the Black Hat security conference by academics in Spain and the U.S. may make that possible.
    Read More
  • 25 July 2012 | Forbes

    DARPA- Funded Researcher Can Take Over Android and Nokia Phones by Merely Waving Another Device Near Them

    At the Black Hat security conference, serial Apple and Android hacker Charlie Miller plans to present a grab bag of new tricks that allow him to take complete control of Android and Nokia phones.
    Read More
  • 25 July 2012 | Ars Technica

    Android, Nokia Smartphone Security Toppled by Near Field Communication Hack

    Miller's Black Hat demonstration includes an attack that exploits a browser bug that ships with every phone running 4.0.1 or earlier of the operating system.
    Read More
  • 25 July 2012 | SC Magazine

    Black Hat: A Deeper Look Into How Exploit Kits Fuel Online Crime

    During a talk Thursday afternoon at the Black Hat conference in Las Vegas, Jason Jones, the team lead for advanced security intelligence at HP's DVLabs, will examine exploit toolkits…
    Read More
  • 25 July 2012 | Government Computer News

    Black Hat: If it Ain't Broke. it's Just a Matter of Time

    Government IT professionals attending this week's Black Hat Briefings will get a look at new research…
    Read More
  • 25 July 2012 | PC World

    Java Vulnerabilities Increasingly Targeted by Attackers, Researchers Say

    Jones has monitored the development of some of the most commonly used Web exploit toolkits, like Blackhole or Phoenix, and will present his findings at Black Hat on Thursday.
    Read More
  • 25 July 2012 | Network World

    Black Hat: RSA Service to Zap Apps Pretending to be From Your Company

    RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores
    Read More
  • 25 July 2012 | EETimes

    Black Hat: Impersonating Microsoft Exchange Servers to Manipulated Mobile Devices

    This Thursday at Black Hat, an Australian researcher will demonstrate a proof-of-concept attack that employs just that type of attack, using a man-in-the-middle connection and Microsoft Exchange…
    Read More
  • 25 July 2012 | Extreme Tech

    Black Hat Hacker Gains Access to 4 Million Hotel Rooms with Arduino Microcontroller

    This hack was demonstrated by Cody Brocious, a Mozilla software developer, at the Black Hat security conference in Las Vegas. At risk are four million hotel rooms…
    Read More
  • 25 July 2012 | eWeek

    Black Hat Hacking Hotel Doors with Open-Source Arduino

    Speaking at the Black Hat security conference here, Brocious demonstrated how locks from Onity—a company that sells security products to hotels and other businesses—can easily be bypassed.
    Read More
  • 25 July 2012 | Network World

    Tatu Ylonen, Father of SSH, Says Security is 'Getting Worse'

    Tatu Ylonen has garnered fame in technology circles as the inventor of Secure Shell (SSH)… (At the Black Hat Conference this week, his company is also announcing CryptoAuditor.)
    Read More
  • 25 July 2012 | Tech Target, SearchSecurity

    Black Hat 2012: Security Visibility and the Hidden Message

    These are just a few examples of how this message of security visibility weaved itself throughout briefings and keynotes at Black Hat.
    Read More
  • 24 July 2012 | CSO

    $50 Hacking Device Opens Millions of Hotel Room Locks

    A black hat hacker has unveiled a method that allows a fairly simple hardware gadget to unlock door locks manufactured by Onity.
    Read More
  • 24 July 2012 | IEEE Spectrum

    Google's App Bouncer Can't Detect When Benign Apps Turn Malicious

    The researchers…say they have alerted Google and will meet with Android researchers this week at the Black Hat and Defcon security conferences in Las Vegas.
    Read More
  • 24 July 2012 | Tweaktown.com

    Your Hotel Keycard Lock is Vulnerable to Hackers

    http://www.tweaktown.com/news/24987/your_hotel_keycard_lock_is_vulnerable_to_hackers/index.html
    Read More
  • 24 July 2012 | Digital Trends

    Your Hotel Room Keycard Lock is Vulnerable to Hackers

    Brocious, who will present his findings at the Black Hat security conference in Las Vegas on Thursday, found that keycard locks made by manufacturer Onity can sometimes be opened using a $50… gadget
    Read More
  • 24 July 2012 | Mobilemag.com

    Hacker Finds Way to Crack Hotel Keycard Systems

    Brocious is set to deliver a presentation today at the Black Hat USA 2012 security conference that will show just how easy it is to open a hotel lock with cheap, open-source parts…
    Read More
  • 24 July 2012 | eSecurityPlanet

    Black Hat: Open Source Web Application Firewall Comes to Microsoft IIS

    At the Black Hat security conference this week, mod security developers will for the first time make their WAF available for the Microsoft IIS web server as well as the nginx open source web server.
    Read More
  • 24 July 2012 | Phys.org

    Computer Hackers and Defenders Mix in Las Vegas

    Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.
    Read More
  • 24 July 2012 | Technobuffalo

    Apple Scheduled to Present at Black Hat Conference on July 26

    Apple on Thursday will make its first appearance ever at the Black Hat conference in Las Vegas, an event that focuses primarily on digital security.
    Read More
  • 24 July 2012 | Ubergizmo

    Apple to Make its First Appearance at Black Hat 2012

    Cool things are happening right now at the Black Hat 2012 conference in Las Vegas.
    Read More
  • 24 July 2012 | TechSpot

    Apple to Talk iOS Security at Black Hat 2012 Conference

    Apple is set to make its first official appearance at the security-focused Black Hat conference this year.
    Read More
  • 24 July 2012 | Tecca

    Hacker: I Can Open a Keycarded Hotel Room Door in Seconds

    Brocious will talk more about his hacking tool (and, more broadly, hotel room security) at the Black Hat USA security conference on July 24.
    Read More
  • 24 July 2012 | Ubergizmo

    Hacker Exposes the Vulnerability of Hotel Locks Used in Over 4 Million Hotel Rooms

    Cody Brocious, demonstrated at a Black Hat security conference…how easily 4 million hotel room keycard locks could be breached by his solution.
    Read More
  • 24 July 2012 | tnooz.com

    Hotel Security Under Question as a Hacker Says Electronic Locks Can Be Opened

    Cody Brocious, a software developer with Mozilla… says he can open hotel doors with Onity systems with a simple open-source device.
    Read More
  • 24 July 2012 | PCWorld

    $50 Hacking Device Opens Millions of Hotel Room Locks

    Cody Brocious recently discovered two vulnerabilities within Onity's locks… Brocious will present his findings at the Black Hat Security Conference in Las Vegas on Tuesday night.
    Read More
  • 24 July 2012 | eWeek

    Qualys Open-Source Mobile Security Took Debuts at Black Hat

    Patel is releasing a new open-source mobile vulnerability framework called the Android Security Evaluation Framework (ASEF) at Black Hat.
    Read More
  • 24 July 2012 | Slashgear

    Apple Heads to Black Hat 2012 Conference for First Time in History

    Apple is heading to the premiere information security conference this year with their platform security manager Dallas DeAtley ready for Black Hat 2012 with bells on.
    Read More
  • 24 July 2012 | VentureBeat

    Apple to Give Rare Talk at Black Hat Security Conference this Thursday

    Bloomberg spotted the event on Black Hat's schedule today. It is hosted by Apple's manager of platform security Dallas De Atley, who will give a talk simply titled "iOS Security."
    Read More
  • 24 July 2012 | CNET

    Apple to Talk iOS Security at Black Hat Confab

    Apple will not only be at this week's Black Hat security confab, but also offer a presentation there too.
    Read More
  • 24 July 2012 | ThreatPost

    Feds Show Up at DEF CON and Black Hat This Time to Talk, Not Snoop

    How much have things changed since the first Black Hat in 1997?... Now, Shawn Henry, a former top FBI official who helped run the bureau's cybercrime program, is keynoting the conference on Wednesday.
    Read More
  • 24 July 2012 | MacObserver.com

    Apple to Present at Black Hat Security Conference

    Apple is making its first official appearance at this week's Black Hat conference with a presentation on iOS security by Dallas De Atley
    Read More
  • 24 July 2012 | PC Magazine

    What Apple Needs to Say at Black Hat

    It should come as no surprise that the most highly anticipated and hush-hush talk at Black Hat this year is the blandly titled "iOS Security" session on July 26
    Read More
  • 24 July 2012 | Bloomberg

    Apple Warms up to Hackers, Plans Presentation at Black Hat

    In the 15 years that computer hackers have gathered in Las Vegas for the Black Hat conference…one company has been noticeably absent: Apple.
    Read More
  • 24 July 2012 | Dark Reading

    Dark Reading, Black Hat Partner to Produce Daily Conference Newsletter

    This first-ever daily show newsletter is to be published jointly by Dark Reading and Black Hat, which are partner organizations under the same parent company, UBM Technology.
    Read More
  • 24 July 2012 | MacRumors

    Apple to Present at Black Hat Security Conference for First Time

    Apple is taking an interesting step into security research publicity, agreeing to present at this week's Black Hat conference in Las Vegas for the first time in the conference's 15-year history.
    Read More
  • 24 July 2012 | Network World

    Apple To Formally Attend Black Hat Security Conference for the First Time

    For the first time, Apple will officially be in attendance at the annual Black Hat security conference, which is scheduled to run through Thursday of this week
    Read More
  • 24 July 2012 | The Verge

    Apple Security Management to Speak at Black Hat Conference this Thursday

    Apple's platform security team manager Dallas De Atley will speak at this year's Black Hat this Thursday, marking Apple's first official appearance at the security-focused event.
    Read More
  • 24 July 2012 | Examiner.com

    Four Million Hotel Keycards Locks Vulnerable to Exploit: Hacker

    It's time for the 2012 Black Hat security conference, and on Tuesday evening, a developer will show hotel and motel travelers that their rooms might not be as safe as they think they are.
    Read More
  • 24 July 2012 | Macgasm

    Apple to Give Presentation About iOS Security at Black Hat Hacker Conference This Week

    The general manager of the Black Hat conference, Trey Ford, has confirmed that for the first time ever Apple will be attending this year's show.
    Read More
  • 24 July 2012 | Tuaw

    Apple to Present at Black Hat Conference

    This Thursday, Apple is poised to do something it's never done before --- give a formal presentation at the Black Hat security conference.
    Read More
  • 24 July 2012 | Ars Technica

    Head of iOS Security to Speak at Black Hat for the First Time

    Apple Platform Security Manager Dallas De Atley is scheduled to present a talk at the annual Black Hat security conference on July 26.
    Read More
  • 24 July 2012 | CultofMac

    Apple Getting Cozy with Hackers, Attending Black Hat Security Conference for the First Time Ever This Thursday

    For a company that has written off trade shows like Macworld, it's interesting that Apple will be officially attending the Black Hat conference in Las Vegas this Thursday.
    Read More
  • 24 July 2012 | CBS News

    Hotel Key Security Flaw Demonstrated at Black Hat Conference

    Mozilla software developer Cody Brocious will give a presentation Tuesday at the Black Hat USA 2012 conference, demonstrating how to open a hotel lock from the manufacturer Onity.
    Read More
  • 24 July 2012 | MacWorld

    Apple to Appear at Black Hat Security Conference

    Apple will give the hacking community a peek under the hood of iOS this week, with the company's first-ever presentation at the Black Hat security conference.
    Read More
  • 24 July 2012 | GigaOM

    A More Open Apple Will Talk iOS Security at Black Hat

    In another sign of the changing culture at Apple, the company is planning to speak at one of the premier information security conferences, Black Hat 2012, for the very first time.
    Read More
  • 24 July 2012 | Engadget

    Hacker Finds Flaw in Hotel Locks Can Ruin Your Vacation With $50 DIY Gadget

    Cody Brocious, who was recently brought on by Mozilla to work on Boot to Gecko, is giving a presentation at the annual Black Hat conference in Vegas…
    Read More
  • 23 July 2012 | Dark Reading

    Using Chip Malfunction to Leak Private Keys

    At Black Hat, a researcher from University of Michigan will show how small electrical malfunctions in server processor chips can make it possible for attackers to glean the contents of a private key
    Read More
  • 23 July 2012 | The Verge

    Hotel Keycard Systems from Onity said to be Vulnerable to Hacking

    Cody Brocious discovered the vulnerability and will present it at this year's Black hat conference
    Read More
  • 23 July 2012 | CNET

    Hotel Cardkey Locks Said to be Vulnerable to Bypass Hack

    Brocious, who is expected to present his findings at the Black Hat conference tomorrow, showed Forbes how he is able to open hotel doors with a gadget he built with materials costing less than $50.
    Read More
  • 23 July 2012 | EE Times

    Black Hat Goes Back to the Future

    To commemorate the 15th anniversary of the annual Black Hat USA information security conference, organizers are bringing back five speakers from the original 1998 event.
    Read More
  • 23 July 2012 | EE Times

    Black Hat Finds Holes in ARM, x86 Embedded

    Security experts will show vulnerabilities in everything from ARM processors to x86 CPUs and even hotel locks at the annual Black Hat conference in Las Vegas this week.
    Read More
  • 23 July 2012 | PC Magazine

    2012 Pwnie Award Nominees Unveiled

    When the winners are announced at the Black Hat conference this Wednesday we'll do our best to explain them.
    Read More
  • 23 July 2012 | SC Magazine

    More over Movie Stars and Your Oscars, Hackers have the Pwnies

    The sixth-annual Pwnie Awards are scheduled for 6:15 PST on Wednesday as part of the Black Hat conference in Las Vegas.
    Read More
  • 23 July 2012 | Reuters

    Web-Connected Industrial Controls Stroke Security Fears

    In his more recent work to be presented at Black Hat, Leverett said he found 36,000 such connected devices, including some in power plants.
    Read More
  • 23 July 2012 | Huffington Post

    Hot to Speak 'Hacker'

    Next week is Black Hat -- perhaps the world's most significant and influential annual hacking conference.
    Read More
  • 23 July 2012 | eWeek

    Black Hat Conference Spotlights Mobile Security, Critical Infrastructure

    The Black Hat conference has started, and is slated to bring thousands of security researchers to Las Vegas for an annual meeting of the minds.
    Read More
  • 23 July 2012 | Bloomberg

    Is Hacking in Self-Defense Legal? It Depends, Says Army Cyber Lawyer

    But the impulse to strike back is fraught with legal danger, said Clark, operational attorney for the U.S. Army Cyber Command, who plans to deliver that message…at the Black Hat security conference
    Read More
  • 23 July 2012 | Network World

    Black Hat demo: Google Bouncer can be Beaten

    This week at the Black Hat Conference in Las Vegas, security firm Trustwave will demonstrate and discuss how it's possible to circumvent the Google Bouncer security check.
    Read More
  • 23 July 2012 | Forbes

    Hacker Will Expose Potential Security Flaw in Four Million Hotel Room Keycard Locks

    At the Black Hat security conference, a Mozilla software developer… Cody Brocious plans to present a pair of vulnerabilities he's discovered in hotel room locks from the manufacturer Onity
    Read More
  • 23 July 2012 | SmartPlanet

    Researcher Releases Smart Meter Hacking Tool

    Both tools, InGuardians' OptiGuard and SecureState's Termineter, are to be demonstrated at Black Hat USA in Las Vegas this week.
    Read More
  • 23 July 2012 | Net-security.org

    Penetration Testing Tool Masquerades as Surge Protector

    Developed by Pwnie Express, a Vermont-based start-up specializing in the creation penetration testing products, the Power Pwn will officially be unveiled this week at Black Hat USA 2012…
    Read More
  • 23 July 2012 | ThreatPost

    Firms Need 'Tough Love' In Struggle Against APTs

    Black Hat is upon us and, with it, a lot of chatter about the dangers posed by so-called "APT," or advanced persistent threats
    Read More
  • 23 July 2012 | TechTarget

    Black Hat 2012: MITRE to detail STIX Cyberthreat Intelligence System

    Researcher Sean Barnum of MITRE will describe the new Structured Threat Information eXpression (STIX) framework this week at the 2012 Black Hat Briefings in Las Vegas.
    Read More
  • 23 July 2012 | html5report.com

    HTML5 Among New Tech to Be Discussed at Black Hat

    The Black Hat Security Conference has been going on for 15 years now and like other years, the top security firms in the country will be discussing a wide range of computing issues.
    Read More
  • 23 July 2012 | PC Magazine

    Ten Ways to Avoid Being Hacked at Black Hat

    Watch is a little quieter than usual these days as the three of us prepare for the annual security mecca, Black Hat USA, in Las Vegas.
    Read More
  • 20 July 2012 | NetworkWorld

    A Multitude of Mobile Security Issues

    The Black Hat USA conference takes place next week...there will be a fair amount of discussion about BYOD and mobile device security.
    Read More
  • 20 July 2012 | ThreatPost

    Termineter Security Framework for Smart Meters Released

    With Black Hat, DEF CON and BSides Las Vegas all looming, researchers are beginning to publish the tools that they'll be discussing during their talks at the various conferences next week.
    Read More
  • 20 July 2012 | ComputerWorld

    Researcher Releases Smart Meter Hacking Tool

    InGuardian is scheduled to disclose details of its tool at the Black Hat security conference also being held in Las Vegas next week.
    Read More
  • 20 July 2012 | Infomationweek/BYTE

    Barack Obama Takes on Cybersecurity

    ....perhaps it's next week's Black Hat 2012 conference in Las Vegas, inspired President Obama to sign his name to a Wall Street Journal op-ed today on what has come to be known as "cybersecurity."
    Read More
  • 20 July 2012 | Vegas Inc.

    Lookingglass Cyber Solutions Aims to Keep an Eye on Hackers

    It begins Saturday and runs through Thursday. About 6,500 cybersecurity professionals are expected to attend, and more than 100 sponsors, including big names like IBM and Microsoft, signed up.
    Read More
  • 20 July 2012 | Extreme Tech

    Unbreakable Crypto: Store a 30-Character Password in Your Brain's Subconscious Memory

    With Black Hat, DEF CON, and the Usenix Security Symposium all taking place in the next few weeks, Bojinov's SISL system is likely just the first of many awesome hacks that will emerge in due course.
    Read More
  • 20 July 2012 | CIO – India

    Blackberry Still the Preferred Choice of Enterprises?

    In a recent Black Hat Conference, Android was declared to be more susceptible to malware attacks.
    Read More
  • 19 July 2012 | Dark Reading

    Attacking SCADA and Relative Cost of Entry

    For those of you with an interest in this area, over the next five days Jonathan Pollet and I will be teaching our annual SCADA security class at Black Hat in Las Vegas.
    Read More
  • 19 July 2012 | Dark Reading

    Smart Grid Researcher Releases Open Source Meter-Hacking Tool

    Don Weber, a senior security analyst with InGuardians, is scheduled to demonstrate the tool at Black Hat USA in Las Vegas next week.
    Read More
  • 19 July 2012 | CSO

    #BlackHat #BSidesLV #Defcon Preview: Trustwave, all over the place

    Now for a look at the Trustwave talks: Practitioners from the company will participate in 14 sessions during Black Hat USA, DEF CON20 and BSidesLV.
    Read More
  • 18 July 2012 | CSO

    #BlackHat Preview: Mobile Threats Take Center Stage

    With everyone and their grandparents in possession of smartphones these days, mobile threats are of great interest to Black Hat USA attendees.
    Read More
  • 18 July 2012 | SearchSecurity

    Black Hat 2012: Windows 8 Security Features Beat Buffer Overflow Attacks

    Researchers Chris Valasek, Coverity Inc., and Tarjei Mandt, Azimuth Security, will present their research next Wednesday at Black Hat 2012.
    Read More
  • 18 July 2012 | SearchSecurity

    Black Hat 2012: Speakers Trending More Than Session Topics

    Regardless of the breadth of content, briefings and trainings at Black Hat are the leading source for the security industry's efforts in research and analysis...
    Read More
  • 18 July 2012 | SecurityWeek

    Black Hat USA Brings Focus on Research

    Next week, the Caesar's Palace hotel in Las Vegas will host the 15th annual gathering of the minds in the world of security known as Black Hat USA.
    Read More
  • 18 July 2012 | SearchSecurity

    Ten Must-see Black Hat 2012 Sessions

    Some editors have posted their thoughts on what they think will be the hot topics of Black Hat 2012…a selection of talks, recommended for all audiences and guaranteed to be hits.
    Read More
  • 18 July 2012 | CSO

    #BlackHat Preview: Owning Bad Guys With JavaScript Botnets

    One of the talks scheduled for Black Hat USA next week is by Chema Alonso, who will demonstrate the ease with which he created JavaScript botnets and used them to turn the table on the bad guys.
    Read More
  • 18 July 2012 | SC Magazine

    Black Hat 2012: Social Engineering Training Benefits IT Teams, End Users

    Philput will deliver a presentation at the 2012 Black Hat Briefings in Las Vegas, explaining how to communicate the need for social engineering tests to upper management....
    Read More
  • 18 July 2012 | SC Magazine

    Podcast: Inside look at Black Hat 2012

    An expected 6,500 IT security enthusiasts are set to converge on Las Vegas next week for the 15th annual Black Hat USA security conference.
    Read More
  • 18 July 2012 | Midsize Insider

    Microsoft Kills Windows Gadgets in Bid to Secure Older OS

    Though they haven't come out and said it, the release is likely tied to an upcoming presentation at Black Hat by researchers Mickey Shkatov and Toby Kohlenberg.
    Read More
  • 17 July 2012 | NetworkWorld

    Exploiting Windows: Upcoming Black Hat Briefings

    The upcoming Black Hat Las Vegas presentation 'We have you by the Gadgets' had Microsoft issuing a security advisory.
    Read More
  • 17 July 2012 | Dark Reading

    'Waldo' Finds Ways to Abuse HTML5 WebSockets

    With new features come new risks, and HTML5 is no exception: Its WebSocket feature opens the door for a wide range of abuses by attackers; researchers will demonstrate next week at Black Hat USA.
    Read More
  • 17 July 2012 | SecurityWeek

    Black Hat: Remediating Attacks in the Age of APTs

    At the upcoming Black Hat conference in Las Vegas, Aldridge plans to take a look at what organizations should be doing in the aftermath of a targeted breach…
    Read More
  • 17 July 2012 | The Ashimmy Blog

    Trainer PR and the Security Bloggers Network Renew Partnership

    Next week the security industry descends on Vegas for its annual fest. Black Hat/Defcon and of course Security Bsides Las Vegas are all great conferences and all of them will be full this year.
    Read More
  • 17 July 2012 | Dark Reading

    Will Advanced Attackers Laugh at your WAF?

    A knowledgeable attacker could bypass the additional security offered by WAFs, according to research that will be presented at the Black Hat USA security conference next week.
    Read More
  • 17 July 2012 | SearchSecurity

    Black Hat 2012: Phoenix, Black Hole Toolkits Rising in Sophistication

    Jason Jones is scheduled to talk about Web exploit toolkits and their sophistication at the 2012 Black Hat Briefings in Las Vegas.
    Read More
  • 17 July 2012 | Computerworld

    Black Hat: Hacking Iris Recognition Systems

    From the Iriscode to the Iris: A New Vulnerability of Iris Recognition Systems is a Black Hat USA briefing scheduled for July 25.
    Read More
  • 16 July 2012 | Daniweb

    Microsoft Adises Users to Nuke Windows 7 Gadgets Now!

    Mickey Shkatov and Toby Kohlenberg are planning to reveal just how insecure the whole Windows Gadget Platform actually is at Black Hat USA in a briefing aptly entitled 'We have you by the Gadgets.
    Read More
  • 16 July 2012 | SearchSecurity

    Black Hat 2012: Google Chrome Sandbox Security Flaws to be Exposed

    Chris Rohlf, of New York-based Leaf Security Research, said he has found numerous vulnerabilities in the Google NaCl implementation, and will present at the 2012 Black Hat Briefings in Las Vegas.
    Read More
  • 16 July 2012 | TechNewsWorld.com

    DNSChanger: Just a Dress Rehearsal

    The move to disable gadgets….came just two weeks before a pair of researchers were scheduled to talk about security risks posed by the applications at the Black Hat conference to be held in Las Vegas.
    Read More
  • 13 July 2012 | bit-tech.net

    Microsoft Kills Sidebar, Gadgets Over Security Concerns

    Toby Kohlenberg, who are due to present a talk entitled We Have You By The Gadgets at the Black Hat Briefings event later this month....
    Read More
  • 12 July 2012 | eWeek

    Microsoft Disables Windows Sidebar, Gadgets Due to Security Risk

    security researchers are scheduled to make a presentation on Gadget vulnerabilities at the annual Black Hat USA 2012 security industry conference beginning July 21 in Las Vegas.....
    Read More
  • 12 July 2012 | Dark Reading

    Crimeware Developers Shift to More Obfuscation, Java Exploits

    Jason Jones, lead for the advanced security intelligence team at Hewlett-Packard's DVLabs, who will present his research on exploit kits at the Black Hat USA security conference later this month.....
    Read More
  • 12 July 2012 | SC Magazine

    Black Hat Hacker Con Promises to 'Ruffle Some Feathers"

    The annual Black Hat security conference, which kicks off in Las Vegas later this month, is full of sessions showcasing the latest research on vulnerabilities and defenses....
    Read More
  • 12 July 2012 | Security News Daily

    Microsoft Terminates Windows Gadgets with Extreme Prejudice

    "We Have You by the Gadgets," scheduled for the Black Hat security conference later this month in Las Vegas....
    Read More
  • 12 July 2012 | TechRights.org

    The End of the Road for Windows Amid Losses, Security Flaws, and Unstoppable Android Expansion

    Microsoft is pulling the plug on the Windows Sidebar and Gadgets platform ahead of news that security vulnerabilities will be disclosed at this year's Black Hat conference....
    Read More
  • 12 July 2012 | Naked Security

    Disable Windows Sidebar and Gadgets NOW on Vista and Windows 7. Microsoft Warns of Security Risk

    The warning comes ahead of a talk scheduled for Black Hat later this month by Mickey Shkatov and Toby Kohlenberg....
    Read More
  • 12 July 2012 | ZDNet

    Daily Cuppa: Dotcom Goes Hungry, Apple Affects the Galaxy 'S3'

    It plans to quickly ditch the platform, after finding out that two security researchers would be talking at the next Black Hat security conference about how the gadgets can be exploited....
    Read More
  • 12 July 2012 | msnbc.com

    Microsoft Tells Customers to Disable Windows Sidebar, Gadgets

    a presentation, entitled "We Have You by the Gadgets," scheduled for the Black Hat security conference later this month in Las Vegas.....
    Read More
  • 12 July 2012 | Ars Technica

    Microsoft Fix Kills Windows Gadgets, Warns it Could Lead to PC Hijacks

    The researchers are scheduled to deliver a presentation on July 26 at the Black Hat security conference in Las Vegas titled "We Have You by the Gadgets....
    Read More
  • 12 July 2012 | PC Magazine

    How to Interest Your Kids in Security

    the grand winner will be announced at the Black Hat briefings in Las Vegas, later this month....
    Read More
  • 12 July 2012 | eHacking News

    NFC Can Be Used to Steal Files and Take Control of Phones

    At the upcoming Black Hat security conference in Vegas, Charlie Miller plans to show off a few clever tricks that rely on near-field communication (NFC) technology.....
    Read More
  • 11 July 2012 | Dark Reading

    Stealing Documents Through Social Media Image-Sharing

    Security researchers will unveil at Black Hat USA a new method of hiding sensitive information in the encoding of seemingly safe images shared on social media sites to avoid security mechanisms....
    Read More
  • 11 July 2012 | eSecurity Planet

    Black Hat 2012 Preview: New Leadership and Apple on Board

    Over the years, Black Hat has developed a better relationship between researchers and the vendor community -- which will be evident at the 2012 event....
    Read More
  • 11 July 2012 | ZDNet

    Security Flaws Signal Early Death of Windows Gadgets

    Microsoft is speeding up plans to kill off the Windows Gadget platform after receiving word that serious security vulnerabilities will be disclosed at the upcoming Black Hat security conference....
    Read More
  • 11 July 2012 | Help Net Security

    Microsoft Revokes 28 of its Code-Signing Certificates

    The vulnerabilities in question will be revealed in a scheduled talk at the Black Hat security conference later this month in Las Vegas....
    Read More
  • 10 July 2012 | Dark Reading

    Apple 'Ban' Gives Miller Time to Hack Other Things

    Charlie Miller won't be exposing any new security holes in Apple products at Black Hat USA this year....
    Read More
  • 10 July 2012 | Softpedia

    Researchers Identify "Invisible" Data Theft at Black Hat USA 2012

    Jonathan Grier, an independent security researchers, will present his findings on July 26, at the Black Hat USA security conference....
    Read More
  • 10 July 2012 | CSO

    Black Hat, DefCon and B-Sides Survival Guide, 2012

    In two weeks a lot of us will head to Las Vegas for Black Hat, DefCon or BSidesLV....
    Read More
  • 10 July 2012 | Network World

    Bruce Schneier's Book: The Internet Has Created 'The Largest Trust Gap' in History

    Schneier's latest book, which he'll be discussing during a talk at the upcoming Black Hat Conference in Las Vegas....
    Read More
  • 10 July 2012 | Infosec Island

    Join Infosec Island and Tripwire at Black Hat USA 2012

    Black Hat remains the biggest and the most important technical security conference series in the world....
    Read More
  • 09 July 2012 | Network Computing

    Research: New SOHO Router Vulnerabilities May Put Enterprises at Risk

    (SOHO) wireless routers could offer a side channel for attackers targeting enterprise networks through a new vulnerability to be presented by a researcher at Black Hat later this month....
    Read More
  • 09 July 2012 | Dark Reading

    'Clonewise' Security Service Helps Identify Vulnerable Code

    At the Black Hat USA security conference later this month in Las Vegas, doctoral student Silvio Cesare of Deakin University in Melbourne, Australia, will demonstrate a service for finding common....
    Read More
  • 09 July 2012 | eWeek

    Android Trojan Infects 100,000 Users, Security Researchers Claim

    However, even Bouncer itself has become a target, and researchers plan to disclose some of the ways it can be bypassed at the upcoming Black Hat USA conference in Las Vegas....
    Read More
  • 06 July 2012 | Dark Reading

    Black Hat: Hacking iOS Applications Under the Spotlight

    But at this year's Black Hat USA in Las Vegas, a number of researchers will be poking around Apple's iOS mobile operating system in the name of security....
    Read More
  • 06 July 2012 | ThreatPost

    Startup CrowdStrike Launches Crowd-Sourced Platform for Malware Analysis

    CrowdStrike said it will introduce the CrowdRE platform at Black Hat and has plans to continue developing the platform....
    Read More
  • 05 July 2012 | Hacker Factor

    Technical Difficulty

    Black Hat is one of the largest computer security conferences in the world....
    Read More
  • 05 July 2012 | Dark Reading

    Seemingly Insignificant SQL Injections Lead to Rooted Routers

    So warns a Black Hat presenter who, in a few weeks, will show how he used SQL injection attacks to put together attacks that lead to remote takeovers of SOHO routers....
    Read More
  • 04 July 2012 | Financial Times

    Warning over Pin Pad Payment Security

    MWR, which plans to highlight its findings at the Black Hat security conference in Las Vegas this month, says that in line with its disclosure policy, it has already alerted Pin pad....
    Read More
  • 04 July 2012 | The Globe and Mail

    Ubiquitous Retailer Debit-card Readers Vulnerable to Hackers, Experts Say

    MWR, which plans to highlight its findings at the Black Hat security conference in Las Vegas this month....
    Read More
  • 03 July 2012 | Dark Reading

    Researchers Use Cloud to Clear Up Malware Evasion

    The survey of evasion techniques will be presented by Rodrigo Branco, director of vulnerability and malware research for security firm Qualys, at the Black Hat security conference this month....
    Read More
  • 03 July 2012 | Network World

    Microsoft's Security Information Report shows lax practices allow malware, like Conficker, to thrive

    In a few weeks, hundreds of hackers will descend on Las Vegas for the Defcon/Black Hat conferences and do their absolute best to never set foot outside of the hotels in the ungodly heat....
    Read More
  • 03 July 2012 | Network World

    Microsoft's Security Information Report shows lax practices allow...

    In a few weeks, hundreds of hackers will descend on Las Vegas for the Defcon/Black Hat conferences and do their absolute best to never set foot outside of the hotels in the ungodly heat. ...
    Read More
  • 28 June 2012 | Dark Reading

    Black Hat: Developer Aims to Make Attach Recovery More Intelligent

    Companies that need to support a large number of users and help them recover from an epidemic spread of malware may get some help at the Black Hat USA security conference this year....
    Read More
  • 28 June 2012 | FierceCIO

    Vacations, Olympics and other IT Security Hazards

    Finally, summer brings a series of security conferences, including Defcon and Black Hat, and the resulting discussions of vulnerabilities tend to invite some efforts at exploitation....
    Read More
  • 28 June 2012 | Dark Reading

    4 Signs That Apple's Sharpening Its Security Game

    During Black Hat events over the last two years, there have been techniques shown that illustrate how cyber-criminals can take a security vulnerability and turn it into a security problem....
    Read More
  • 28 June 2012 | ITP.net

    Security Stress

    A member of Apple's security team is scheduled to give a briefing on iOS security next month at Black Hat USA in Las Vegas....
    Read More
  • 26 June 2012 | Dark Reading

    New Forensics Method May Nab Insider Thieves

    Next month at Black Hat USA in Las Vegas, a presenter will bring forward a new methodology that compares normal file access patterns against patterns present when files are copied....
    Read More
  • 26 June 2012 | InformationWeek

    Google Bouncer Beat Up By Security Researchers

    the two security researchers plan to report at the Black Hat security conference in Las Vegas next month....
    Read More
  • 26 June 2012 | CSO

    Do Automatic OS X Security Updates Signal a Sea Change at Apple?

    Blake Turrentine, of HotWAN and a trainer for Black Hat, said he hasn't seen a shift....
    Read More
  • 25 June 2012 | Dark Reading

    Researchers Beat Up Google's Bouncer

    the two security researcher plan to report at the Black Hat security conference in Las Vegas next month....
    Read More
  • 25 June 2012 | Security Watch

    Pentester's World Cup Rewards Best Hackers

    The winner will receive an entrance ticket for the Black Hat conference, coming in late July, including hotel accommodations....
    Read More
  • 25 June 2012 | CSO-The Resource for Security Executives

    Summer security concerns: 4 warm-weather worries

    It's summertime, but the living may not be easy if your job is in security. Here are four trends security will be tracking this season.......
    Read More
  • 25 June 2012 | SecurityWeek

    Researcher to Talk HTML5 Security at Black Hat

    HTML5 brings with it the promise of increased functionality. More functionality however, as usual, comes with a price – an increased attack surface......
    Read More
  • 25 June 2012 | Softpedia

    Android Network Tool-Kit Pentester's World Cup Launched by Zimperium

    The security researcher who gathers most points will become a zNinja and will have the opportunity to take part in this year's Black Hat convention in Las Vegas....
    Read More
  • 22 June 2012 | Computerworld

    Finalists in Microsoft's $250K Contest Take on 'Most-Pressing' Exploit Tactic

    The three finalists will be flown to next month's Black Hat security conference in Las Vegas, where Microsoft will reveal the results July 26....
    Read More
  • 22 June 2012 | Dark Reading

    Broader Digital Landscape Means More Places to Hide

    a pair of security researchers plan to argue at the Black Hat USA conference next month....
    Read More
  • 22 June 2012 | Deb Shinder's Blog

    Countdown to Black Hat/ Defcon

    The last week in July is always one to look forward to, as that's when security professionals and hackers gather in Las Vegas for the annual Black Hat Briefings held in recent years at Caesar's Palace....
    Read More
  • 21 June 2012 | SC Magazine

    Microsoft Names Three Finalists for $200k BlueHat Crown

    The winner will be announced July 26 during this year's Black Hat show....
    Read More
  • 21 June 2012 | CRN

    Channel Asks Apple to Enage Alliances to Improve Security

    The need for increased dialogue seems as though it might be part of Apple's plan. The company has plans to establish a strong presence at next month's the Black Hat security conference in Las Vegas.....
    Read More
  • 19 June 2012 | SecurityWeek

    Apple's iOS6 to Enforce Strict Data Permissions

    Some of the items discussed in the guide will be discussed this summer at the Black Hat Security Conference in Las Vegas....
    Read More
  • 19 June 2012 | CSO Online

    Black Hat targets the C-level

    Black Hat General Manager Trey Ford wants his events to bridge the gap between hackers and the C-level. In an interview with CSO, Ford noted that an entire day -- Tuesday, July 24 -- will be dedicated to the executive level....
    Read More
  • 18 June 2012 | Reuters

    Hacked Companies Fight Back With Controversial Steps

    Jeff Moss, founder of the influential Black Hat security conferences and an advisor to the Department of Homeland Security.....
    Read More
  • 18 June 2012 | CSO Online

    Booth babe debate is back, in time for summer cons!

    Last year I caught a bit of grief from readers after I wrote a couple posts suggesting vendors who use booth babes should try attracting people based on the strength of its products instead.....
    Read More
  • 15 June 2012 | CRN

    Five Companies That Came to Win This Week

    But news of its planned participation at next month's Black Hat security conference could be even more significant, as it suggests a shift in the company's longstanding silence on security matters....
    Read More
  • 13 June 2012 | InformationWeek

    New Virtualization Vulnerability Allows Escape to Hypervisor Attacks

    Wojtczuk is scheduled to present a session at next month's Black Hat (BH) conference in Las Vegas....
    Read More
  • 13 June 2012 | Reuters

    Experts Warn of Shortage of US Cyber Pros

    who founded the Defcon and Black Hat hacking conferences that are held in Las Vegas each summer....
    Read More
  • 12 June 2012 | SecurityWeek

    Apple to Discuss iOS Security at Black Hat 2012

    They're going to do a presentation on security at one of the world's most known security events – Black Hat.....
    Read More
  • 12 June 2012 | CRN

    Analysis: Why Apple's Participation At Black Hat Is A Big Deal

    Booming sales of iPhones and iPads are causing Apple to do things it has not done in the past, and the company's planned appearance at next month's Black Hat security conference is the latest example....
    Read More
  • 11 June 2012 | CRN

    Apple to Make First Official Appearance at Black Hat Next Month

    In the latest sign of Apple getting less squirrelish about discussing the security of its products, the company is sending an executive to the Black Hat conference next month to present on its behalf.....
    Read More
  • 11 June 2012 | CSO

    Black Hat Next Month: Here's a Little Preview

    I'm pretty happy about going to Black Hat next month....
    Read More
  • 07 June 2012 | BRG

    What it's like to get hacked

    With "hacktivist" groups like Anonymous and stories like the LinkedIn security breach constantly popping up in the news, it's easy to grow numb to matters of digital security despite their seriousness......
    Read More
  • 07 June 2012 | FierceGovernmentIT

    Napolitano Announces DHS Cyber Workforce Development Effort

    The new task force, to be co-chaired by Black Hat founder Jeff Moss....
    Read More
  • 06 June 2012 | Wired Workplace

    Deepening the Cybersecurity Bench

    The new task force, co-chaired by Jeff Moss, founder and director of the Black Hat and DefCon security conferences......
    Read More
  • 02 June 2012 | COMPUTERWORLD

    Finalists in Microsoft's $250K contest take on 'most-pressing' exploit tactic

    Microsoft yesterday announced that each of the three finalists in its $250,000 BlueHat Prize security contest came up with ways to detect and stymie one of the most effective exploit methods now being used by hackers.......
    Read More
  • 29 May 2012 | CSO

    Mobile Leads in Malware Resurgence for 2012

    Blake Turrentine, a mobile security expert and trainer for Black Hat ....
    Read More
  • 26 May 2012 | Forbes

    Researchers Say They Snuck Malware App Past Google's 'Bouncer' Android Market Scanner

    plan to present security vulnerabilities they say they've discovered in Google's mobile platform at the Black Hat security conference in July.....
    Read More
  • 18 May 2012 | IT Portal

    The iPhone and iPad are Targets for Hackers

    Blake Turrentine, CEO of HotWAN and trainer at Black Hat, is watching closely the evolution of malware in the mobile ecosystem.....
    Read More
  • 17 May 2012 | CSO

    iPhone, iPad Become Apple of Cyber Criminals' Eye

    Blake Turrentine, CEO of HotWAN and trainer at Black Hat, has been a penetration tester for more than 12 years.....
    Read More
  • 15 May 2012 | Forbes

    Antivirus Firm: 75% of Phone-Based Malware Now Targets Androis

    Though a pair of researchers claim they'll explain how they've done it as a proof of concept at the upcoming Black Hat security conference this summer....
    Read More
  • 09 May 2012 | ZDNet

    Microsoft Patches 'Sons of Duqu' Flaws

    Forshaw will give a presentation on exploiting the flaws at the Black Hat USA conference in July.....
    Read More
  • 05 May 2012 | Wired

    MI6 Condebreaker Attended US Security Conference Before His Death

    Black Hat is one of the top security conferences in the world, targeting the professional security crowd, while DefCon is geared more specifically to hackers.....
    Read More
  • 30 April 2012 | Dark Reading

    Advanced Attacks Call for New Defenses

    The grand-prize, second-, and third-place winners will be announced at the upcoming Black Hat USA 2012 conference in Las Vegas....
    Read More
  • 09 April 2012 | Ars Technica

    Help Ars Round Out Our 2012-2013 Tech Conference Dance Card

    Black Hat USA, Las Vegas, July 21-24....
    Read More
  • 04 April 2012 | Computerworld

    Microsoft Acquires 20 new Windows Security Ideas for $13,400 Each

    The three winners will be flown to Las Vegas this July, when Microsoft will announce the results at the Black Hat security conference.....
    Read More

LatestIntel

View More

UpcomingEvents

ShowCoverage

StayConnected

Fill out the form below to stay up to date on the latest Black Hat info, newsletters and intel.

Email*
First Name
Last Name
Subscription Group

Sustaining Partners