Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat Europe 2016: Penetration Testing is Key in Enhancing Your Security
Black Hat Staff,
Last year, 594 million people were affected by cybercrime around the world (according to Norton Cybersecurity Insights Report). Cyber attacks will only become more sophisticated in the years to come. As the severity of online attacks continue to escalate, it is critical to find ways to mitigate potential exploits. Penetration testing is a great method of detecting vulnerabilities in your systems or devices and weve highlighted a few Black Hat Trainings that can truly enhance your skills.
By Black Hat Staff , 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Beware of Malware
Black Hat Staff,
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
By Black Hat Staff , 6/30/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Windows Security
Black Hat Staff,
Microsofts Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
By Black Hat Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
How Diversity Can Bridge The Talent Gap
Kelly Jackson Higgins, Executive Editor at Dark ReadingCommentary
Women and minorities in the security industry share some hard truths about the security industrys hiring traditions and practices.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/18/2016
Comment3 comments  |  Read  |  Post a Comment
User Ed: Patching People Vs Vulns
Lysa Myers, Security Researcher, ESETCommentary
How infosec can combine and adapt security education and security defenses to the way users actually do their jobs.
By Lysa Myers Security Researcher, ESET, 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Radio: What Keeps IT Security Pros Awake at Night
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Join us for a wide-ranging discussion with (ISC) Chief Exec David Shearer on the most worrisome infosec trends and challenges.
By Marilyn Cohodas Community Editor, Dark Reading, 8/16/2016
Comment0 comments  |  Read  |  Post a Comment
6 Things To Know For Securing Amazon Web Services
Steve Zurier, Freelance Writer
AWS is coming out with more new cloud security features.
By Steve Zurier Freelance Writer, 8/13/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of ATM Hacking
Sara Peters, Senior Editor at Dark ReadingNews
Research released at Black Hat USA last week shows that one of our best defenses for the future of payment card and ATM security isn't infallible. Here's why.
By Sara Peters Senior Editor at Dark Reading, 8/11/2016
Comment4 comments  |  Read  |  Post a Comment
Government, Hackers Learn To Make Nice
Terry Sweeney, Contributing EditorNews
It's still an uneasy alliance, but the hacking community and government are finding their way toward more constructive dialog and cooperation
By Terry Sweeney Contributing Editor, 8/10/2016
Comment4 comments  |  Read  |  Post a Comment
PLC Worms Pose Stealthy Threat To Industrial Systems
Jai Vijayan, Freelance writerNews
Researchers at Black Hat USA demonstrated 'PLC Blaster' worm capable of infecting programmable logic controllers and spreading to other systems.
By Jai Vijayan Freelance writer, 8/10/2016
Comment0 comments  |  Read  |  Post a Comment
Spearphishing: Its Curiosity That Makes Them Click
Steve Zurier, Freelance WriterNews
Researchers prove that people can be fooled just because they want to know whats on the other end of that email. Here are three steps you can take without spending too much money.
By Steve Zurier Freelance Writer, 8/9/2016
Comment2 comments  |  Read  |  Post a Comment
New Internet Security Domains Debut
Terry Sweeney, Contributing EditorNews
Meet the new .security and .protection domains.
By Terry Sweeney Contributing Editor, 8/5/2016
Comment7 comments  |  Read  |  Post a Comment
Dark Reading News Desk Coming Back To Black Hat, Live
Sara Peters, Senior Editor at Dark ReadingNews
Live from Las Vegas: over 40 video interviews with Black Hat USA conference speakers and sponsors. Wednesday Aug. 3, Thursday Aug, 4, starting at 2 p.m. ET.
By Sara Peters Senior Editor at Dark Reading, 8/4/2016
Comment1 Comment  |  Read  |  Post a Comment
Nigerian Prince All Grown Up And Bilking Millions From Businesses Via BEC
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers discover leader of wire-wire gang thats made millions off by laundering victims business transactions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/4/2016
Comment0 comments  |  Read  |  Post a Comment
Best Of Black Hat Innovation Awards: And The Winners Are
Tim Wilson, Editor in Chief, Dark ReadingCommentary
Three companies and leaders who think differently about security: Deep Instinct, most innovative startup; Vectra, most innovative emerging company; Paul Vixie, most innovative thought leader.
By Tim Wilson Editor in Chief, Dark Reading, 8/3/2016
Comment1 Comment  |  Read  |  Post a Comment
Researchers Show How To Steal Payment Card Data From PIN Pads
Jai Vijayan, Freelance writerNews
Attack works even against chip-enabled EMV smartcards.
By Jai Vijayan Freelance writer, 8/3/2016
Comment0 comments  |  Read  |  Post a Comment
Kaminsky Creates Prototype To Lock Out Attackers
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security expert warns the Internet could be lost to regulators and hackers if industry doesn't start locking down security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/3/2016
Comment1 Comment  |  Read  |  Post a Comment
Hotel POS and Magstripe Cards Vulnerable to Attacks, Brute-Forcing
Terry Sweeney, Contributing EditorNews
Researchers from Rapid7 at DefCon will demonstrate vulnerabilities that allow attackers to turn point-of-sale devices into keyboards
By Terry Sweeney Contributing Editor, 8/2/2016
Comment3 comments  |  Read  |  Post a Comment
Dark Reading Radio at Black Hat 2016: 2 Shows, 4 #BHUSA Presenters
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Even if you can't physically be at Black Hat USA 2016, Dark Reading offers a virtual alternative to engage with presenters about hot show topics and trends.
By Marilyn Cohodas Community Editor, Dark Reading, 8/2/2016
Comment0 comments  |  Read  |  Post a Comment
This Time, Miller & Valasek Hack The Jeep At Speed
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Car hacking duo accelerates -- literally -- their epic Jeep Cherokee hack.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/1/2016
Comment3 comments  |  Read  |  Post a Comment
Browser Exploits Increasingly Go For The Jugular
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat USA panel to discuss browser attacks, which now go from browser userland to root privileges in no time flat.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/1/2016
Comment0 comments  |  Read  |  Post a Comment
8 Bad Ass Tools Coming Out Of Black Hat
Ericka Chickowski, Contributing Writer, Dark Reading
Penetration testing, reverse engineering and other security tools that will be explained and released at Black Hat 2016.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/30/2016
Comment2 comments  |  Read  |  Post a Comment
Multiple Major Security Products Open To Big Vulns Via 'Hooking Engines'
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat USA talk will show how flawed implementation of hooking techniques are putting security and other software at risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Cartoon