Security Experts:

Black Hat
long dotted

NEWS & INDUSTRY UPDATES

Please join Trend Micro and SecurityWeek on Wednesday, Oct. 30th at Neptune's Waterfront Grill & Bar in San Francisco for an interactive security event with great food and open bar!
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
Black Hat expanded its lineup of security events, announcing on Thursday that it will host a Black Hat Regional Summit in Brazil this November.
Several researchers targeted devices such as door locks, alarm systems and smart TVs in a demonstration of how vulnerable many non-traditional Internet-connected devices are.
SCADA systems used on oil rigs and other areas of the oil industry are using outdated networking protocols that can easily be compromised, SCADA experts told attendees at the Black Hat security conference.
Smart homes that let residents control alarms, locks and more over the internet are opening doors for crooks with hacker skills, according to computer security specialists.
The organizers of Black Hat have issued a statement on the unexpected death of famed hacker Barnaby Jack who died in San Francisco on Thursday. Instead, the conference organizers said, the allotted hour on Tuesday will be left vacant to commemorate his life and work.
Well known hardware hacker Barnaby Jack has passed away, according to several reports, sending a shock through the security community with the biggest hacker-focused security conference of the year just days away.

FEATURES, INSIGHTS // Black Hat

rss icon

Mark Hatton's picture
At a time when many are questioning the need for continued spending on security, it’s time for us as security professionals to step up and meet these challenges and prove that it is money well spent.
Wade Williamson's picture
The idea of teaching someone how to hack almost always generates a negative visceral reaction, because the assumption is that you intend to teach someone how to become a criminal. However, an understanding of hacking no more makes a criminal than an understanding of karate makes someone use the discipline maliciously.
Robert Vamosi's picture
Drawing parallels with the SCADA industry, researcher Jay Radcliffe gave a personal account of his experience of having Type 1 diabetes and how various devices he uses control his diabetes could be manipulated by "evil doers" at this week's Black Hat Conference.
Mike Lennon's picture
Las Vegas is about to transform into Hackertown, USA. This week, thousands of hackers from across the country and around the world will assemble in Las Vegas for a series of hacker conferences, including the most anticipated and hottest conference of the year, Black Hat USA 2011.
Noa Bar-Yosef's picture
Online gambling sites face security challenges from a number of different sources. First, there’s the external hacker, who at his own convenience – from his home, a cafe or on the road – can launch attacks in attempt to steal sensitive data, raise havoc or commit fraud.
Robert Vamosi's picture
In the hours proceeding the annual Hack In The Box conference in Amsterdam, researcher Don Bailey visited Boston, Afghanistan, Libya, and at the White House. Or so his tracking device reported...
Matt Hines's picture
Why is Julian Assange getting all the ethical hacking harshing? Isn’t this Jeff Moss inviting similar rule-breaking, convention-smashing mayhem into our country, nay the world, by inviting hackers to come to these events and tell everyone how to break into important stuff?
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Samy Kamkar demonstrates how to extract extremely accurate geo-location information from a Web browser, while not using any IP geo-location data.