Researchers show they can access an internet-connected car wash using the default password and program it to damage cars or…
Research at Black Hat contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by…
Android and iOS already issued patches for bug that could result in the spread of unstoppable malware
Better get used to it and do regular backups, as Google study discovers how lucrative ransomware is for criminal gangs
Time to grow up. Security head of Facebook urges industry to concentrate more on helping people stay safe and stop…
Annual week of security conferences in Las Vegas gets underway as researchers prepare to detail all manner of threats that…
Among the updates issued by Apple this month is one for the Broadpwn bug that was already patched by Google…
Black Hat survey finds enterprises are increasing their attackable surface area by 100 times with a move to cloud infrastructure…
BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware
FBI reportedly paid “grey hat” hackers a one-off fee to crack the iPhone of a dead terrorist
IT security professionals believe their companies are on the hit list
A hardware flaw detailed at Black Hat allows attackers to take control of Intel chips' most privileged mode
Attackers can hijack fingerprint-protected transactions and harvest fingerprints from mobile devices, according to FireEye
The random numbers used by web cryptographic systems aren't random enough, say security researchers
It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find
NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a…
Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always…
The upcoming Black Hat USA 2015 will cover new security flaws, defensive approaches to security, enterprise security practices and more
Magnitude creators want to be paid in compromised machines, not money
Flaws in SATCOM firmware could compromise security of planes and ships, warns Ruben Santamarta, who will show his findings at…
Researchers use free Cloud accounts to create a botnet, rather than hijacking computer resources from innocent victims
Researchers from Carnegie Mellon University have been told to keep quiet
Asian espionage networks have compromised government and corporate systems worldwide, researchers warn
Security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure, according to researchers at the…
Trustwave's researchers have built a tool designed to help improve security by mimicking highly targeted attacks
Def Con founder says people need "time to think about how we got here" after Edward Snowden revelations
Security experts from the US' Securities and Exchange Commission travelled to the Black Hat Security Briefings conference with laptops containing…
Oracle has fixed a security flaw in its flagship database product that was exposed at the Black Hat security conference
Good thing UK airports are scrapping the IRIS programme after the Olympics...
Black Hat USA 2012 conference attendees hit by apparent phishing attack