Black Hat

Black Hat 2017: Hacked Car Wash Could ‘Physically Attack’ People

Researchers show they can access an internet-connected car wash using the default password and program it to damage cars or…

7 years ago

Antivirus Software Cloud Use Exposes Customers To Data Exfiltration

Research at Black Hat contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by…

7 years ago

Unpatched Smartphones ‘At Risk’ From Broadpwn Bug

Android and iOS already issued patches for bug that could result in the spread of unstoppable malware

7 years ago

Google: Ransomware Will Remain A Very Real Threat

Better get used to it and do regular backups, as Google study discovers how lucrative ransomware is for criminal gangs

7 years ago

Facebook Boss Scolds Security Industry And Urges Attitude Change

Time to grow up. Security head of Facebook urges industry to concentrate more on helping people stay safe and stop…

7 years ago

Black Hat, DefCon 2017 Security Conferences To Reveal New Threats

Annual week of security conferences in Las Vegas gets underway as researchers prepare to detail all manner of threats that…

7 years ago

Apple Updates iOS And macOS Security Ahead Of Black Hat

Among the updates issued by Apple this month is one for the Broadpwn bug that was already patched by Google…

7 years ago

Security Teams Not Keeping Up With Exponential Cloud Server Growth

Black Hat survey finds enterprises are increasing their attackable surface area by 100 times with a move to cloud infrastructure…

8 years ago

Apple Launches £150,000 Bug Bounty Program

BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware

8 years ago

FBI Paid Hackers To Unlock San Bernardino iPhone

FBI reportedly paid “grey hat” hackers a one-off fee to crack the iPhone of a dead terrorist

9 years ago

Most Businesses Are Potential Targets for Nation-State Cyberattacks

IT security professionals believe their companies are on the hit list

9 years ago

Memory ‘Sinkhole’ Lets Attackers Take Control Of Intel Chips

A hardware flaw detailed at Black Hat allows attackers to take control of Intel chips' most privileged mode

9 years ago

Researchers Detail ‘Severe’ Mobile Fingerprint Flaws

Attackers can hijack fingerprint-protected transactions and harvest fingerprints from mobile devices, according to FireEye

9 years ago

Internet Security ‘Undermined By Random Number Weaknesses’

The random numbers used by web cryptographic systems aren't random enough, say security researchers

9 years ago

Android Fingerprint Readers Are Also A Security Risk

It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find

9 years ago

Why Google Has Yet To Fix Chromecast Flaw One Year Later

NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a…

9 years ago

Q&A With Black Hat, DEF CON Founder Jeff Moss

Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always…

9 years ago

Black Hat Set to Expose More Than 30 Zero-Day Flaws

The upcoming Black Hat USA 2015 will cover new security flaws, defensive approaches to security, enterprise security practices and more

9 years ago

Magnitude Exploit Kit Grows In Popularity Thanks To Free Distribution Model

Magnitude creators want to be paid in compromised machines, not money

10 years ago

Satellite Wi-Fi Vulnerabilities Could Be Used To Hack Aircraft Says Researcher

Flaws in SATCOM firmware could compromise security of planes and ships, warns Ruben Santamarta, who will show his findings at…

10 years ago

Hackers Use Free Cloud Accounts To Create Cryptocurrency Mining Botnet

Researchers use free Cloud accounts to create a botnet, rather than hijacking computer resources from innocent victims

10 years ago

Black Hat Cancels Talk About Identifying Tor Users ‘On A Budget’

Researchers from Carnegie Mellon University have been told to keep quiet

10 years ago

‘Chicken Farm’ Botnets Actively Target Governments, Researchers Warn

Asian espionage networks have compromised government and corporate systems worldwide, researchers warn

11 years ago

Researchers Expose Industrial Infrastructure Sabotage Risk

Security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure, according to researchers at the…

11 years ago

Black Hat 2013: Trustwave Releases Spear-Phishing Tool

Trustwave's researchers have built a tool designed to help improve security by mimicking highly targeted attacks

11 years ago

Feds Told To Take ‘Time Out’ From Def Con Hacking Conference

Def Con founder says people need "time to think about how we got here" after Edward Snowden revelations

11 years ago

Report: US Finance Officials Brought Sensitive Data To Hacker Convention

Security experts from the US' Securities and Exchange Commission travelled to the Black Hat Security Briefings conference with laptops containing…

12 years ago

Oracle Fixes Security Flaw In Flagship Database

Oracle has fixed a security flaw in its flagship database product that was exposed at the Black Hat security conference

12 years ago

Iris Scanners Hacked At Black Hat USA 2012

Good thing UK airports are scrapping the IRIS programme after the Olympics...

12 years ago

Black Hat Cringes As Its Users Get Phishing Email

Black Hat USA 2012 conference attendees hit by apparent phishing attack

12 years ago