Black Hat Asia
March 24-27, 2015
Marina Bay Sands | Singapore
Black Hat USA
August 1-6, 2015
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 10-13, 2015
Amsterdam RAI | The Netherlands
Event Updates
Black Hat Asia 2015: Break All the Security
Black Hat Staff,
You can't spell 'exploit' without 'Black Hat.' Wait, that didn't come out right... how embarrassing. While our word engineers troubleshoot the aphorism we just fried, you might enjoy this latest round-up of Black Hat Asia 2015 Briefings. You'll note they focus on security exploits, not wordplay. Probably for the best.
By Black Hat Staff , 3/4/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2015: Never Too Early - Web App Security
Black Hat Staff,
We admit: Given that this is February, August's Black Hat USA 2015 still feels quite a ways off... and it is! But we've got such an impressive array of programming this year that we can't help but want to start sharing. So welcome to the first intel update for Black Hat USA 2015, of many to come. And here, too, is your first reminder to take advantage of our early-bird registration rates. Got it? Good. Now let's talk web application vulnerability Trainings.
By Black Hat Staff , 2/27/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2015: Target: Malware
Black Hat Staff,
Hostile software is ever evolving, and Black Hat-associated research is one of the key loci of information on monitoring, defending against, and nullifying it. With that in mind, today we'll preview a quartet of interesting malware-related Briefings from Black Hat Asia 2015.
By Black Hat Staff , 2/26/2015
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Blackhat, The Movie: Good, Bad & Ridiculous
Jeff Schmidt, Founder & CEO of JAS Global Advisors LLCCommentary
It didnít take home an Oscar, but in some instances Blackhat was right on point. Still, a white-hat hacker with the skills to take out armed opponents?
By Jeff Schmidt Founder & CEO of JAS Global Advisors LLC, 2/23/2015
Comment2 comments  |  Read  |  Post a Comment
How To Get More Involved In The IT Security Community
Tim Wilson, Editor in Chief, Dark ReadingCommentary
Dark Reading Radio offers tips on how to network with your IT security peers, learn more about the industry and the profession, and participate in community outreach
By Tim Wilson Editor in Chief, Dark Reading, 2/18/2015
Comment6 comments  |  Read  |  Post a Comment
The Internet of Things: 7 Scary Security Scenarios
Marilyn Cohodas, Community Editor, Dark Reading
The IoT can be frightening when viewed from the vantage point of information security.
By Marilyn Cohodas Community Editor, Dark Reading, 10/16/2014
Comment9 comments  |  Read  |  Post a Comment
Smart Meter Hack Shuts Off The Lights
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
European researchers will reveal major security weaknesses in smart meters that could allow an attacker to order a power blackout.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/1/2014
Comment5 comments  |  Read  |  Post a Comment
Black Hat & DEF CON: 3 Lessons From A Newbie
Kerstyn Clover, Attack & Defense Team ConsultantCommentary
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
By Kerstyn Clover Attack & Defense Team Consultant, 9/9/2014
Comment8 comments  |  Read  |  Post a Comment
All In For The Coming World of 'Things'
Don Bailey, Founder & CEO, Lab Mouse SecurityCommentary
At a Black Hat round table, experts discuss the strategies necessary to lock down the Internet of Things, the most game-changing concept in Internet history.
By Don Bailey Founder & CEO, Lab Mouse Security, 8/25/2014
Comment6 comments  |  Read  |  Post a Comment
Access Point Pinched From Black Hat Show WLAN
Kelly Jackson Higgins, Executive Editor at Dark ReadingCommentary
A few apparent pranks, practice DDoS attacks, and other mischievous activities were spotted on the Black Hat USA wireless network in Las Vegas this month.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/19/2014
Comment4 comments  |  Read  |  Post a Comment
Hacker Couture: As Seen At Black Hat USA, BSides, DEF CON
Kelly Jackson Higgins, Executive Editor at Dark Reading
'Leet tattoos, piercings, mega-beards, (the real) John McAfee, and even a cute puppy were among the colorful sights in Las Vegas this month.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/18/2014
Comment14 comments  |  Read  |  Post a Comment
Traffic To Hosting Companies Hijacked In Crypto Currency Heist
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Attacker likely a current or former ISP employee, researchers say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/14/2014
Comment2 comments  |  Read  |  Post a Comment
Tech Insight: Hacking The Nest Thermostat
John H. Sawyer, Contributing Writer, Dark ReadingNews
Researchers at Black Hat USA demonstrated how they were able to compromise a popular smart thermostat.
By John H. Sawyer Contributing Writer, Dark Reading, 8/14/2014
Comment6 comments  |  Read  |  Post a Comment
Internet Of Things Security Reaches Tipping Point
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Public safety issues bubble to the top in security flaw revelations.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2014
Comment11 comments  |  Read  |  Post a Comment
Security Holes Exposed In Trend Micro, Websense, Open Source DLP
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers Zach Lanier and Kelly Lum at Black Hat USA took the wraps off results of their security testing of popular data loss prevention software.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/12/2014
Comment5 comments  |  Read  |  Post a Comment
CloudBot: A Free, Malwareless Alternative To Traditional Botnets
Sara Peters, Senior Editor at Dark ReadingNews
Researchers take advantage of cloud service providers' free trials and lousy anti-automation controls to use cloud instances like bots.
By Sara Peters Senior Editor at Dark Reading, 8/11/2014
Comment1 Comment  |  Read  |  Post a Comment
No Fixes In Sight For Satellite Terminal Flaws
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
At Black Hat USA, a researcher who in April revealed weaknesses in popular satellite ground terminal equipment found on air, land and sea, demonstrates possible attack scenarios.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2014
Comment2 comments  |  Read  |  Post a Comment
Heartbleed, GotoFail Bring Home Pwnie Awards
Sara Peters, Senior Editor at Dark ReadingQuick Hits
The Pwnie Awards celebrate the best bug discoveries and worst security fails.
By Sara Peters Senior Editor at Dark Reading, 8/7/2014
Comment5 comments  |  Read  |  Post a Comment
Attack Harbors Malware In Images
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
'Lurk' click-fraud campaign now employing steganography.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2014
Comment0 comments  |  Read  |  Post a Comment
When Good USB Devices Go Bad
Brian Prince, Contributing Writer, Dark ReadingNews
Researchers offer more details about how USB devices can be leveraged in attacks.
By Brian Prince Contributing Writer, Dark Reading, 8/7/2014
Comment1 Comment  |  Read  |  Post a Comment
Dan Geer Touts Liability Policies For Software Vulnerabilities
Sara Peters, Senior Editor at Dark ReadingNews
Vendor beware. At Black Hat, Dan Geer suggests legislation to change product liability and abandonment rules for vulnerable and unsupported software.
By Sara Peters Senior Editor at Dark Reading, 8/6/2014
Comment6 comments  |  Read  |  Post a Comment
TSA Checkpoint Systems Found Exposed On The Net
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher Billy Rios exposes new threats to airport security systems.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/6/2014
Comment2 comments  |  Read  |  Post a Comment
A Peek Inside The Black Hat Show Network
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat USA's wireless network offers authenticated, secure access as well as 'open' access.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/5/2014
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Register for Dark Reading Newsletters
Current Issue
Cartoon