The organizers of the Black Hat security conference have issued a statement on the unexpected death of famed hacker Barnaby Jack, who died in San Francisco on Thursday, saying the planned talk on vulnerabilities in implantable medical devices by Jack on Thursday will not be replaced. Instead, the conference organizers said, the allotted hour on will be left vacant to commemorate his life and work.
Black Hat issued the following statement on Friday.
We have lost a member of our family. Everyone would agree that the life and work of Barnaby Jack are legendary and irreplaceable. Barnaby had the ability to take complex technology and intricate research and make it tangible and accessible for everyone to learn and grow from. Beyond his work in our industry, Barnaby was an incredibly warm hearted and welcoming individual with a passion for celebrating life. We all have a hilarious and upbeat story about Barnaby. He is truly a shining example of what we love about this community.
Black Hat will not be replacing Barnaby’s talk on Thursday, Aug. 1. No one could possibly replace him, nor would we want them to. The community needs time to process this loss. The hour will be left vacant as a time to commemorate his life and work, and we welcome our attendees to come and share in what we hope to be a celebration of his life. Barnaby Jack meant so much to so many people, and we hope this forum will offer an opportunity for us all to recognize the legacy that he leaves behind.
Our deepest sympathies go out to Barnaby Jack’s family and loved ones. Words cannot adequately describe how much he will be missed, but it is certain that Barnaby will NEVER be forgotten.
Advertisement. Scroll to continue reading.Related Reading: Barnaby Jack (1977-2013): Farewell to a Daring Wunderkind
Barnaby Jack is probably best known for his ATM hacking demonstrations, which he liked to refer as “Jackpotting”, and has performed at a few conferences, including a demonstration at Black Hat 2010 that got media attention around the world.
Jack has served as Director of Embedded Device Security at IOActive since October 2012, after a 10-month stint at McAfee, returning to IOActive where he previously held various roles. Jack also did stints also at eEye Digital Security and Juniper Networks.
“Lost but never forgotten our beloved pirate, Barnaby Jack has passed. He was a master hacker and dear friend. Here’s to you Barnes!” IOActive Tweeted.
Related Reading: Barnaby Jack (1977-2013): Farewell to a Daring Wunderkind
Related News: Famed Hacker Barnaby Jack Dies Days Before Black Hat Conference
Related Video: Barnaby Jack Demonstrates ATM Hacking at Black Hat
Related Reading: Barnaby Jack Leaves McAfee to Return To IOActive

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million
- Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan
- Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform
- Watch Now: Cloud & Data Security Summit Sessions
- Watch on Demand: 2023 CISO Forum Sessions
- Virtual Event Today: CISO Forum 2023 – Register to Join
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
Latest News
- Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Lumu Raises $30 Million for Threat Detection and Response Platform
- Government Shutdown Could Bench 80% of CISA Staff
- Moving From Qualitative to Quantitative Cyber Risk Modeling
- Cisco Warns of IOS Software Zero-Day Exploitation Attempts
- Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits
- Sysdig Launches Realtime Attack Graph for Cloud Environments
