Security Experts:

Black Hat
long dotted


Black Hat expanded its lineup of security events, announcing on Thursday that it will host a Black Hat Regional Summit in Brazil this November. [Read More]
Several researchers targeted devices such as door locks, alarm systems and smart TVs in a demonstration of how vulnerable many non-traditional Internet-connected devices are. [Read More]
SCADA systems used on oil rigs and other areas of the oil industry are using outdated networking protocols that can easily be compromised, SCADA experts told attendees at the Black Hat security conference. [Read More]
Smart homes that let residents control alarms, locks and more over the internet are opening doors for crooks with hacker skills, according to computer security specialists. [Read More]
The organizers of Black Hat have issued a statement on the unexpected death of famed hacker Barnaby Jack who died in San Francisco on Thursday. Instead, the conference organizers said, the allotted hour on Tuesday will be left vacant to commemorate his life and work. [Read More]
Well known hardware hacker Barnaby Jack has passed away, according to several reports, sending a shock through the security community with the biggest hacker-focused security conference of the year just days away. [Read More]
At the upcoming Black Hat conference in Las Vegas a researcher will demonstrate how SIM card vulnerabilities can be used to hijack mobile phones over the air. [Read More]
A Russian researcher accused Huawei of being slow to address security issues, stating that their 3G and 4G mobile broadband devices were vulnerable to attack due to problems with their update channel. [Read More]
Saturday afternoon at DerbyCon, SecurityWeek sat down with Ryan Sevey, an information security consultant for a utility company, who gave a talk on security solutions for Small and Mid Size Businesses. [Read More]
As for the risk of having a SOHO router hijacked, it’s actually rather strong. Security researchers Michael Coppola said that he discovered thousands of IP addresses owned by open routers that use default credentials. [Read More]


rss icon

Mark Hatton's picture
At a time when many are questioning the need for continued spending on security, it’s time for us as security professionals to step up and meet these challenges and prove that it is money well spent.
Wade Williamson's picture
The idea of teaching someone how to hack almost always generates a negative visceral reaction, because the assumption is that you intend to teach someone how to become a criminal. However, an understanding of hacking no more makes a criminal than an understanding of karate makes someone use the discipline maliciously.
Robert Vamosi's picture
Drawing parallels with the SCADA industry, researcher Jay Radcliffe gave a personal account of his experience of having Type 1 diabetes and how various devices he uses control his diabetes could be manipulated by "evil doers" at this week's Black Hat Conference.
Mike Lennon's picture
Las Vegas is about to transform into Hackertown, USA. This week, thousands of hackers from across the country and around the world will assemble in Las Vegas for a series of hacker conferences, including the most anticipated and hottest conference of the year, Black Hat USA 2011.
Noa Bar-Yosef's picture
Online gambling sites face security challenges from a number of different sources. First, there’s the external hacker, who at his own convenience – from his home, a cafe or on the road – can launch attacks in attempt to steal sensitive data, raise havoc or commit fraud.
Robert Vamosi's picture
In the hours proceeding the annual Hack In The Box conference in Amsterdam, researcher Don Bailey visited Boston, Afghanistan, Libya, and at the White House. Or so his tracking device reported...
Matt Hines's picture
Why is Julian Assange getting all the ethical hacking harshing? Isn’t this Jeff Moss inviting similar rule-breaking, convention-smashing mayhem into our country, nay the world, by inviting hackers to come to these events and tell everyone how to break into important stuff?
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Samy Kamkar demonstrates how to extract extremely accurate geo-location information from a Web browser, while not using any IP geo-location data.