SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.
Two security experts found a way to automate a JavaScript attack that could infect beyond the browser.
A vulnerability found in near field communication could enable attackers to swipe information from end-users by simply brushing their phone with a malicious tag, according to an expert at this year's Black Hat conference.
A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads.
In this Black Hat 2012 press conference video, Don Weber, hardware analysis expert at InGuardian, discusses the threats involved with advanced metering infrastructure.
There's plenty of new technology now available to address the privacy concerns of web tracking, but there are also ways to evade these controls in order to follow the digital footsteps of internet users.
July 25, 2012
SC Magazine chats with security researcher, Cody Brocious, who discovered a vulnerability in more than four million hotel room locks.
Industry professionals must update and continue to adapt their security tactics, according to an expert at this year's Black Hat conference in Las Vegas.
July 25, 2012
The strategies used to fight adversaries in the real world are not much different than ones used to battle attackers in the cyber realm, Shawn Henry said during Wednesday's keynote.
July 25, 2012
Microsoft announced Wednesday that it is integrating a prize contender's research into its Enhanced Mitigation Experience Toolkit.
July 24, 2012
The Electronic Frontier Foundation is one of the security research community's fiercest allies.
A researcher on Thursday will navigate through the underbelly of the internet to describe how exploit kits function, who is profiting off them, what to expect in the future and how organizations can protect their networks.
July 24, 2012
To the casual observer, Black Hat and DefCon might look the same. But those who have been attending the annual Las Vegas events for years know the shows take on decidedly distinct tones. While Black Hat has turned noticeably more corporate -- yet still edgy -- over the years, DefCon has emerged as the more unruly (cooler?) of the two.
July 23, 2012
The offbeat show is billed as an opportunity to crown the achievements of researchers and malware authors, while also relishing in the failures of the inept.
July 23, 2012
The annual Black Hat conference got off to an inauspicious start on Sunday when 7,500 attendees received a dubious email.
July 18, 2012
To get a better understanding of how the show is shaping up, we caught up with Trey Ford, the newly appointed general manager of Black Hat, who discussed his transformation from booth babe to conference organizer, how the numbers stack up this year, which sessions are on his can't-miss list and why the parties are just as important to attend as daytime talks.
Google appears to be on a mission to dispel the public perception that its Android Market has become a prime vector for malicious activity.