Black Hat 2012

Video: Legal guidance for security researchers

By

SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.

Black Hat: Researchers take over Linksys router with simple JavaScript

By

Two security experts found a way to automate a JavaScript attack that could infect beyond the browser.

Black Hat: NFC exploit could overtake mobile device through a simple graze

By

A vulnerability found in near field communication could enable attackers to swipe information from end-users by simply brushing their phone with a malicious tag, according to an expert at this year's Black Hat conference.

Black Hat: Most Java malware exploits "type confusion" vulnerability

By

A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads.

Black Hat Video: Threats surrounding advanced metering infrastructure

In this Black Hat 2012 press conference video, Don Weber, hardware analysis expert at InGuardian, discusses the threats involved with advanced metering infrastructure.

Black Hat: Researcher talks alternative web tracking techniques

By

There's plenty of new technology now available to address the privacy concerns of web tracking, but there are also ways to evade these controls in order to follow the digital footsteps of internet users.

Black Hat Video: Hotel room locks may not stay locked

Black Hat Video: Hotel room locks may not stay locked

SC Magazine chats with security researcher, Cody Brocious, who discovered a vulnerability in more than four million hotel room locks.

Black Hat: Security pros must evolve their defensive strategy

By

Industry professionals must update and continue to adapt their security tactics, according to an expert at this year's Black Hat conference in Las Vegas.

Black Hat: Former FBI top cyber cop says defenders need to think more tactically

Black Hat: Former FBI top cyber cop says defenders need to think more tactically By

The strategies used to fight adversaries in the real world are not much different than ones used to battle attackers in the cyber realm, Shawn Henry said during Wednesday's keynote.

Always bet on blue

Always bet on blue By

Microsoft announced Wednesday that it is integrating a prize contender's research into its Enhanced Mitigation Experience Toolkit.

Pro-bono legal aid in Sin City...for security researchers

Pro-bono legal aid in Sin City...for security researchers By

The Electronic Frontier Foundation is one of the security research community's fiercest allies.

Black Hat: A deeper look into how exploit kits fuel online crime

By

A researcher on Thursday will navigate through the underbelly of the internet to describe how exploit kits function, who is profiting off them, what to expect in the future and how organizations can protect their networks.

Like it or not, the NSA will be at DefCon

Like it or not, the NSA will be at DefCon By

To the casual observer, Black Hat and DefCon might look the same. But those who have been attending the annual Las Vegas events for years know the shows take on decidedly distinct tones. While Black Hat has turned noticeably more corporate -- yet still edgy -- over the years, DefCon has emerged as the more unruly (cooler?) of the two.

Move over movie stars and your Oscars, hackers have the Pwnies

Move over movie stars and your Oscars, hackers have the Pwnies By

The offbeat show is billed as an opportunity to crown the achievements of researchers and malware authors, while also relishing in the failures of the inept.

If it looks like a phish...it may not always be

If it looks like a phish...it may not always be By

The annual Black Hat conference got off to an inauspicious start on Sunday when 7,500 attendees received a dubious email.

Podcast: Inside look at Black Hat 2012

Podcast: Inside look at Black Hat 2012 By

To get a better understanding of how the show is shaping up, we caught up with Trey Ford, the newly appointed general manager of Black Hat, who discussed his transformation from booth babe to conference organizer, how the numbers stack up this year, which sessions are on his can't-miss list and why the parties are just as important to attend as daytime talks.

Google using custom malware scanner for Android apps

By

Google appears to be on a mission to dispel the public perception that its Android Market has become a prime vector for malicious activity.

Sign up for our newsletters

POLL