Researchers show they can access an internet-connected car wash using the default password and program it to damage cars or harm people
News Black Hat
Antivirus Software Cloud Use Exposes Customers To Data Exfiltration
Research at Black Hat contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by malware
Unpatched Smartphones ‘At Risk’ From Broadpwn Bug
Android and iOS already issued patches for bug that could result in the spread of unstoppable malware
Google: Ransomware Will Remain A Very Real Threat
Better get used to it and do regular backups, as Google study discovers how lucrative ransomware is for criminal gangs
Facebook Boss Scolds Security Industry And Urges Attitude Change
Time to grow up. Security head of Facebook urges industry to concentrate more on helping people stay safe and stop “stunt” hacks
Black Hat, DefCon 2017 Security Conferences To Reveal New Threats
Annual week of security conferences in Las Vegas gets underway as researchers prepare to detail all manner of threats that put the connected world at risk
Apple Updates iOS And macOS Security Ahead Of Black Hat
Among the updates issued by Apple this month is one for the Broadpwn bug that was already patched by Google in the July Android update
Security Teams Not Keeping Up With Exponential Cloud Server Growth
Black Hat survey finds enterprises are increasing their attackable surface area by 100 times with a move to cloud infrastructure environments
Apple Launches £150,000 Bug Bounty Program
BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware
FBI Paid Hackers To Unlock San Bernardino iPhone
FBI reportedly paid “grey hat” hackers a one-off fee to crack the iPhone of a dead terrorist
Most Businesses Are Potential Targets for Nation-State Cyberattacks
IT security professionals believe their companies are on the hit list
Memory ‘Sinkhole’ Lets Attackers Take Control Of Intel Chips
A hardware flaw detailed at Black Hat allows attackers to take control of Intel chips' most privileged mode
Researchers Detail ‘Severe’ Mobile Fingerprint Flaws
Attackers can hijack fingerprint-protected transactions and harvest fingerprints from mobile devices, according to FireEye
Internet Security ‘Undermined By Random Number Weaknesses’
The random numbers used by web cryptographic systems aren't random enough, say security researchers
Android Fingerprint Readers Are Also A Security Risk
It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find
Why Google Has Yet To Fix Chromecast Flaw One Year Later
NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a flaw in Chromecast that was demonstrated at last year's Black Hat security conference
Q&A With Black Hat, DEF CON Founder Jeff Moss
Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always keep your keys in your pocket
Black Hat Set to Expose More Than 30 Zero-Day Flaws
The upcoming Black Hat USA 2015 will cover new security flaws, defensive approaches to security, enterprise security practices and more
Magnitude Exploit Kit Grows In Popularity Thanks To Free Distribution Model
Magnitude creators want to be paid in compromised machines, not money
Satellite Wi-Fi Vulnerabilities Could Be Used To Hack Aircraft Says Researcher
Flaws in SATCOM firmware could compromise security of planes and ships, warns Ruben Santamarta, who will show his findings at Black Hat USA
Hackers Use Free Cloud Accounts To Create Cryptocurrency Mining Botnet
Researchers use free Cloud accounts to create a botnet, rather than hijacking computer resources from innocent victims
Black Hat Cancels Talk About Identifying Tor Users ‘On A Budget’
Researchers from Carnegie Mellon University have been told to keep quiet
‘Chicken Farm’ Botnets Actively Target Governments, Researchers Warn
Asian espionage networks have compromised government and corporate systems worldwide, researchers warn
Researchers Expose Industrial Infrastructure Sabotage Risk
Security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure, according to researchers at the Black Hat security conference
Black Hat 2013: Trustwave Releases Spear-Phishing Tool
Trustwave's researchers have built a tool designed to help improve security by mimicking highly targeted attacks
Feds Told To Take ‘Time Out’ From Def Con Hacking Conference
Def Con founder says people need "time to think about how we got here" after Edward Snowden revelations
Report: US Finance Officials Brought Sensitive Data To Hacker Convention
Security experts from the US' Securities and Exchange Commission travelled to the Black Hat Security Briefings conference with laptops containing sensitive security information, according to a report
Oracle Fixes Security Flaw In Flagship Database
Oracle has fixed a security flaw in its flagship database product that was exposed at the Black Hat security conference
Iris Scanners Hacked At Black Hat USA 2012
Good thing UK airports are scrapping the IRIS programme after the Olympics...
Black Hat Cringes As Its Users Get Phishing Email
Black Hat USA 2012 conference attendees hit by apparent phishing attack