Black Hat USA
August 2-7, 2014
Mandalay Bay, Las Vegas, NV
Black Hat Europe
October 14-17, 2014
Amsterdam Rai, The Netherlands
Event Updates
Black Hat USA 2014: Danger! High Bandwidth
Black Hat Staff,
Now that the world is basically one giant network, it's kind of mind-blowing to look back at computers from the days before they were so intimately intertwined. But the ubiquity of networking is also our Achilles' heel, which today's trio of Black Hat Briefings amply illustrate with their focus on Internet-based attacks.
By Black Hat Staff , 7/22/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Policy Matters
Black Hat Staff,
Black Hat isn't just hacking and exploits, though that's certainly high on our agenda. Today's trio of Black Hat USA 2014 Briefings center on politics -- big-picture stuff like the real-world effects of the NSA's surveillance, the legal risks facing security researchers, and the freedom of the Internet itself.
By Black Hat Staff , 7/17/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Something Strange in the Neighborverse
Black Hat Staff,
Few words are as aptly descriptive as "malware"; cue the overused "what it says on the tin" remark. Of course, hostile software is ever evolving, and Black Hat-associated research is one of the key loci of information on monitoring, defending against, and nullifying it. With that in mind, today we'll preview a quartet of interesting malware-related Briefings from Black Hat USA 2014.
By Black Hat Staff , 7/16/2014
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
7 Black Hat Sessions Sure To Cause A Stir
Ericka Chickowski, Contributing Writer, Dark Reading
At Black Hat, researchers will point out the weaknesses in everything from the satellites in outer space to the thermostat in your home.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/22/2014
Comment8 comments  |  Read  |  Post a Comment
Don't Overestimate EMV Protections, Underestimate Card Thief Sophistication
Ericka Chickowski, Contributing Writer, Dark ReadingNews
At Black Hat, an AccessData researcher will offer up a crash course in card payment tech and protections to root out security community misconceptions
By Ericka Chickowski Contributing Writer, Dark Reading, 7/21/2014
Comment2 comments  |  Read  |  Post a Comment
Hacking Your Hotel Room
Brian Prince, Contributing Writer, Dark ReadingNews
At Black Hat USA next month, a researcher will show how to hack your way into controlling everything in a hotel room -- from lighting to television sets.
By Brian Prince Contributing Writer, Dark Reading, 7/18/2014
Comment12 comments  |  Read  |  Post a Comment
Ransomware: 5 Threats To Watch
Kelly Jackson Higgins, Senior Editor, Dark Reading
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/17/2014
Comment13 comments  |  Read  |  Post a Comment
Tapping Into A Homemade Android Army
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat speaker will detail how security researchers can expedite their work across numerous Android devices at once.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/15/2014
Comment2 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Third-Party Vulns Spread Like Diseases
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Understanding the impact of vulnerabilities in libraries and other components
By Ericka Chickowski Contributing Writer, Dark Reading, 7/7/2014
Comment2 comments  |  Read  |  Post a Comment
Researcher Finds Flaws In Key Oracle Security Feature
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Famed security researcher and Oracle database expert David Litchfield next month at Black Hat USA will present details of weaknesses he discovered in a widely touted new security feature in Oracle databases.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/2/2014
Comment0 comments  |  Read  |  Post a Comment
VDI Under The Security Microscope
Brian Prince, Contributing Writer, Dark ReadingNews
Black Hat USA researchers explore security risks with virtual desktop infrastructure with BYOD.
By Brian Prince Contributing Writer, Dark Reading, 6/13/2014
Comment10 comments  |  Read  |  Post a Comment
How Researchers Helped Cripple CryptoLocker
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
A Black Hat USA speaker will give the backstory on how he and others helped disrupt the infamous CyptoLocker operation, and what they learned about it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 6/5/2014
Comment4 comments  |  Read  |  Post a Comment
Dark Reading To Launch Weekly Internet Radio Show
Tim Wilson, Editor in Chief, Dark ReadingCommentary
DR Radio will take place every Wednesday at 1:00 p.m. ET and will feature live chat; first topic will be "A Day in the Life of a Penetration Tester."
By Tim Wilson Editor in Chief, Dark Reading, 5/20/2014
Comment2 comments  |  Read  |  Post a Comment
Black Hat Asia 2014: The Weaponized Web
Dark Reading, News
These Black Hat Briefings explore ways the Web can be weaponized -- and how to defend against them
By Dark Reading , 3/7/2014
Comment0 comments  |  Read  |  Post a Comment
Internet Pioneer And ICANN Chairman Of The Board To Keynote Black Hat Asia 2014
Dark Reading, News
Dr. Steve Crocker has been involved with the Internet since its inception
By Dark Reading , 2/13/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2014: The Internet Of Things
Dark Reading, News
Here are three Briefings from Black Hat Asia 2014 that focus on hacking Net-enabled hardware
By Dark Reading , 2/6/2014
Comment0 comments  |  Read  |  Post a Comment
Can We End CSRF With Header-Based Browser Policies?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Newly proposed Storage Origin Security (SOS) policy presented at Black Hat could offer a simpler way to combat cross-site request forgery
By Ericka Chickowski Contributing Writer, Dark Reading, 8/13/2013
Comment0 comments  |  Read  |  Post a Comment
Attackers' Toolbox Makes Malware Detection More Difficult
Robert Lemos, Technology JournalistNews
From virtual-machine detection to taking a 30-minute nap, the array of techniques used by attackers to stymie malware analysis is growing
By Robert Lemos Technology Journalist, 8/12/2013
Comment0 comments  |  Read  |  Post a Comment
A New Framework For Detecting Advanced Rootkits
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Last week the security community gained another way to help secure endpoints as researchers released a new framework meant to root out rootkits in UEFI
By Ericka Chickowski Contributing Writer, Dark Reading, 8/9/2013
Comment0 comments  |  Read  |  Post a Comment
A New Framework For Detecting Advanced Rootkits
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Last week the security community gained another way to help secure endpoints as researchers released a new framework meant to root out rootkits in UEFI
By Ericka Chickowski Contributing Writer, Dark Reading, 8/9/2013
Comment0 comments  |  Read  |  Post a Comment
Black Hat: The Problems Don't Change, But The Solutions Have
Mike Rothman, Analyst & President, SecurosisCommentary
An increase in attacker capabilities has drawn an innovative response from industry, and emerging research promises more to come
By Mike Rothman Analyst & President, Securosis, 8/9/2013
Comment1 Comment  |  Read  |  Post a Comment
Maltego Gets More 'Teeth'
Robert Lemos, Technology JournalistNews
New features in Maltego, an open-source intelligence tool for defenders, allow penetration testers and attackers to gather data on vulnerable systems and manage botnets
By Robert Lemos Technology Journalist, 8/9/2013
Comment0 comments  |  Read  |  Post a Comment
Maltego Gets More 'Teeth'
Robert Lemos, Technology JournalistNews
New features in Maltego, an open-source intelligence tool for defenders, allow penetration testers and attackers to gather data on vulnerable systems and manage botnets
By Robert Lemos Technology Journalist, 8/9/2013
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Register for Dark Reading Newsletters
Current Issue
Cartoon