Black Hat

  • How to make an Android spy phone

    Posted August 5, 2013 - 1:59 pm

    Injecting malicious code into legitimate Android mobile applications can turn smartphones into spyphones with little effort, which could pose a problem for businesses that support BYOD programs, a researcher told the Black Hat security conference.
  • There may be more Android "master keys" for corrupting mobile apps

    Posted August 5, 2013 - 1:58 pm

    Remember that Android mobile "master key" vulnerability that was patched last month? It turns out there are other opportunities within the Google operating system to perform similar attacks against Android mobile apps, a Black Hat conference speaker said this week.
  • Black Hat 2013: Rise of the (smart) machines

    Posted August 5, 2013 - 9:35 am

    Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks.
  • Black Hat: Ad networks lay path to million-strong browser botnet

    Posted July 29, 2013 - 5:01 am

    Long ago, we surrendered our privacy to the web. But research presented at this week’s Black Hat Briefings in Las Vegas suggests that structural problems in the way the web works means we may have also surrendered our security, as well.
  • Black Hat Europe: 10 intriguing security briefings

    Posted March 12, 2013 - 11:46 am

    What could possibly go wrong having a bunch of hackers hunkering down in Amsterdam this week at Black Hat Europe 2013? We're afraid to speculate, but what should go right is that they're ready to present a lineup of briefings at this annual security event that look topical and compelling.
  • Black Hat, Defcon security horror stories show enterprise vulnerabilities

    Posted September 12, 2012 - 10:34 am

    Java hacks, VPN hacks, firewall hacks and even hotel room key hacks. Nothing is safe anymore, judging from an analysis of presentations at Black Hat and Defcon this summer. The lesson for enterprise CIOs? Be afraid. Be very afraid.
  • Apple security guru lays out iPad, iPhone crypto architecture at Black Hat

    Posted July 27, 2012 - 10:52 am

    A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted.
  • Charlie Miller wows Black Hat with NFC-based smartphone hacking demo

    Posted July 26, 2012 - 10:14 am

    At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC) capability in the smartphones.
  • Black Hat panel: Which do you trust less with your data, the U.S. government or Google?

    Posted July 26, 2012 - 10:09 am

    To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the U.S. government, cyberwar and Google.
  • Tool released at Black Hat contains 150 ways to bypass Web application firewalls

    Posted July 25, 2012 - 8:11 pm

    A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2012 security conference on Wednesday.
  • Black Hat: Cyber-espionage operations vast yet highly focused, researcher claims

    Posted July 25, 2012 - 5:27 pm

    Cyber-espionage operations across the Internet are extensive yet highly targeted, says a malware researcher speaking this week at the Black Hat Conference in Las Vegas. And it's not just governments targeting other governments or trying to steal corporate secrets -- private security companies also are involved in these break-ins even while claiming to offer "ethical hacking services."
  • P2P 'Gameover ZeuS' seen as largest bank-theft botnet

    Posted July 25, 2012 - 5:26 pm

    It's the largest bank-theft botnet out there, and its peer-to-peer (P2P) design, credited to cybercrime gangs in Eastern Europe, is going to make it hugely difficult to take down, according to research put forward at the Black Hat Conference.
  • Apple to appear at Black Hat security conference

    Posted July 24, 2012 - 2:21 pm

    Apple will give the hacking community a peek under the hood of iOS this week, with the company's first-ever presentation at the Black Hat security conference.
  • Black Hat demo: Google Bouncer can be beaten

    Posted July 23, 2012 - 2:17 pm

    Google in February implemented in its Google Play (formerly Android Market) a technology called Bouncer to check apps submitted by Android developers for any traces of malicious code. This week at the Black Hat Conference in Las Vegas, security firm Trustwave will demonstrate and discuss how it's possible to circumvent the Google Bouncer security check.
  • Microsoft urges death of Windows gadgets as researchers plan disclosures

    Posted July 11, 2012 - 10:35 am

    Just two weeks before researchers are to disclose bugs in Windows "gadgets" at Black Hat, Microsoft acknowledged unspecified security vulnerabilities in the small pieces of software supported by Vista and Windows 7.
  • Black Hat targets the C-level

    Posted June 20, 2012 - 2:38 pm

    In an interview with CSO, Black Hat General Manager Trey Ford explains how the annual summer pilgrimage to Las Vegas is no longer for hackers alone
  • At Black Hat learn to: kill diabetics, destroy Sony, steal a car, work at NSA

    Posted August 8, 2011 - 1:54 pm

    Demos at Black Hat were typically flashy, impressive and fascinating. They didn't compare to the global cyberespionage campaigns that have kept us at cyberwar for years without knowing it.
  • Can hacker assassins target insulin pumps?

    Posted August 8, 2011 - 12:37 pm

    Don't you love it when separate trends crash into each other, making a big fracking mess? That's what we have with the fattening of America creating more diabetics. Insulin pump manufacturers, trying to be all cool and with it, make wireless insulin pumps. And those trends run head on into the Black Hat convention in Las Vegas last week, where security researcher Jay Radcliffe detailed how his insulin pump and continuous glucose meter turned his body into a SCADA system. And those can be hacked.
  • Hacker unlocks cars via text message

    Posted August 5, 2011 - 11:03 am

    One of the hot stories at Black Hat this year is the weakness of devices connected to cellular GSM networks. Example? Unlocking cars by attacking some device or service included in the car that links to the cell phone network.
  • R u h4X0R? n33d @ jo8? NSA wants you (locked up in a cubicle, not a cell)

    Posted August 2, 2011 - 2:25 pm

    NSA, the intelligence agency responsible for eavesdropping on foreign conversations and digital communications, is at Black Hat to recruite hackers to crack the "hardest problems," and is willing to put up with people who don't wear crisp white shirts every day to get them.
  • New hacking tools on tap from Anonymous at this week's Black Hat

    Posted August 1, 2011 - 4:23 pm

    Anonymous is coming to this year's Black Hat a favorite for the Pwnies and a contributor to the new tools section, with a better option for DDOS attacks than DDOS, and a virus kit.
  • Black Hat demo shows you don't have to be the Air Force to own a WiFi spy drone

    Posted July 29, 2011 - 4:18 pm

    You can't get to every target you'd like to hack through the Internet. Sometimes it's better to hover over the WiFi network or smartphone owner and just listen covertly on what's going on. If the BUZZZZ of your engine doesn't tip off your targets.
  • Black Hat Pwnie Award winner will be a criminal

    Posted July 27, 2011 - 1:41 pm

    Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees face possible criminal charges.
  • Exploit demo on tap at Black Hat could 'make your water undrinkable'

    Posted July 27, 2011 - 11:41 am

    A demo at Black Hat next week will remotely hack a car alarm, unlock the doors and start the vehicle, but that's just a parlor trick to call attention to a bigger problem that has the Department of Homeland Security on alert.
  • After delay, hacker to show flaws in Siemens industrial gear

    Posted June 6, 2011 - 8:20 pm

    A security researcher who says he's found serious problems with Siemens computers used in power plants and heavy industry is now expecting to go public with his research at the Black Hat security conference in Las Vegas.
Join us:






Join today!

See more content
Ask a Question