Security Experts:

Black Hat
long dotted

NEWS & INDUSTRY UPDATES

At the upcoming Black Hat conference in Las Vegas a researcher will demonstrate how SIM card vulnerabilities can be used to hijack mobile phones over the air.
A Russian researcher accused Huawei of being slow to address security issues, stating that their 3G and 4G mobile broadband devices were vulnerable to attack due to problems with their update channel.
Saturday afternoon at DerbyCon, SecurityWeek sat down with Ryan Sevey, an information security consultant for a utility company, who gave a talk on security solutions for Small and Mid Size Businesses.
As for the risk of having a SOHO router hijacked, it’s actually rather strong. Security researchers Michael Coppola said that he discovered thousands of IP addresses owned by open routers that use default credentials.
Chinese communications giant Huawei Technologies on Wednesday responded to US hackers' claims that its routers were easily cracked, saying its security strategies were rigorous.
It’s Sunday evening, surrounded by sand and mountains, the glitz and glamour of Las Vegas twinkles a fond farewell to thousands of hackers as they head home from Def Con’s 20th anniversary gathering.
At the DEF CON security conference, which wrapped this past weekend, researcher Thomas Cannon of viaForensics revealed how to brute-force attacks on Android devices.
HTML5, the new Web standard that will make it easier to develop websites and applications that run on various screen sizes, is also vulnerable to stealth attacks and silent exploits, a security researcher said at the Black Hat security conference.
Information security professionals can establish a better relationship with the users within the organization by improving lines of communication, a security analyst told Black Hat attendees.
Dressed in casual attire, the nation’s top intelligence official made history by being the highest ranked government official to speak at DEF CON in its 20-year history.

FEATURES, INSIGHTS // Black Hat

rss icon

Mark Hatton's picture
At a time when many are questioning the need for continued spending on security, it’s time for us as security professionals to step up and meet these challenges and prove that it is money well spent.
Wade Williamson's picture
The idea of teaching someone how to hack almost always generates a negative visceral reaction, because the assumption is that you intend to teach someone how to become a criminal. However, an understanding of hacking no more makes a criminal than an understanding of karate makes someone use the discipline maliciously.
Robert Vamosi's picture
Drawing parallels with the SCADA industry, researcher Jay Radcliffe gave a personal account of his experience of having Type 1 diabetes and how various devices he uses control his diabetes could be manipulated by "evil doers" at this week's Black Hat Conference.
Mike Lennon's picture
Las Vegas is about to transform into Hackertown, USA. This week, thousands of hackers from across the country and around the world will assemble in Las Vegas for a series of hacker conferences, including the most anticipated and hottest conference of the year, Black Hat USA 2011.
Noa Bar-Yosef's picture
Online gambling sites face security challenges from a number of different sources. First, there’s the external hacker, who at his own convenience – from his home, a cafe or on the road – can launch attacks in attempt to steal sensitive data, raise havoc or commit fraud.
Robert Vamosi's picture
In the hours proceeding the annual Hack In The Box conference in Amsterdam, researcher Don Bailey visited Boston, Afghanistan, Libya, and at the White House. Or so his tracking device reported...
Matt Hines's picture
Why is Julian Assange getting all the ethical hacking harshing? Isn’t this Jeff Moss inviting similar rule-breaking, convention-smashing mayhem into our country, nay the world, by inviting hackers to come to these events and tell everyone how to break into important stuff?
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Samy Kamkar demonstrates how to extract extremely accurate geo-location information from a Web browser, while not using any IP geo-location data.