Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat USA 2016: Beware of Malware
Black Hat Staff,
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
By Black Hat Staff , 6/30/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Windows Security
Black Hat Staff,
Microsoft’s Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
By Black Hat Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Digital Communication Security
Black Hat Staff,
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study “Digital in 2016” by We Are Social). Since a large portion of the world’s population communicates using the internet, cyber security is a priority for users.
By Black Hat Staff , 6/6/2016
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Multiple Major Security Products Open To Big Vulns Via 'Hooking Engines'
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat USA talk will show how flawed implementation of hooking techniques are putting security and other software at risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2016
Comment1 Comment  |  Read  |  Post a Comment
How To Stay Safe On The Black Hat Network: ‘Don’t Connect To It’
Neil R. Wyler (Grifter), Threat Hunting and Incident Response Specialist, RSACommentary
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and there’s no better place to do it than Black Hat.
By Neil R. Wyler (Grifter) Threat Hunting and Incident Response Specialist, RSA, 7/28/2016
Comment2 comments  |  Read  |  Post a Comment
Dark Reading News Desk Coming Back To Black Hat, Live
Sara Peters, Senior Editor at Dark ReadingNews
Live from Las Vegas: 40 video interviews with Black Hat USA conference speakers and sponsors. Wednesday Aug. 3, Thursday Aug, 4, 2 p.m. - 6:10 p.m. ET.
By Sara Peters Senior Editor at Dark Reading, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Vixie’s Farsight Rolls Out Its First Enterprise DNS Security Service
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
DNS expert aims for proactive protection, defense of organizations' online domains.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
In Security, Know That You Know Nothing
Michael Sutton, Chief Information Security Office, ZscalerCommentary
Only when security professionals become aware of what they don’t know, can they start asking the right questions and implementing the right security controls.
By Michael Sutton Chief Information Security Office, Zscaler, 7/26/2016
Comment7 comments  |  Read  |  Post a Comment
SentinelOne Offers $1 Million Guarantee To Stop Ransomware
Sara Peters, Senior Editor at Dark ReadingNews
Jeremiah Grossman continues his crusade to make security vendors take responsibility for their own gear.
By Sara Peters Senior Editor at Dark Reading, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hottest Talks at Black Hat USA 2016
Sean Martin, CISSP | President, imsmartin
The impressive roll call of speakers offers a prime opportunity to learn from the very best of the information security world.
By Sean Martin CISSP | President, imsmartin, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Building Black Hat: Locking Down One Of The World’s Biggest Security Conferences
Aamir Lakhani, Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced LabsCommentary
For security pros, being asked to help secure Black Hat is like being asked to play on the Olympic basketball team.
By Aamir Lakhani Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced Labs, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Improving Attribution & Malware Identification With Machine Learning
Sara Peters, Senior Editor at Dark ReadingNews
New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.
By Sara Peters Senior Editor at Dark Reading, 7/20/2016
Comment0 comments  |  Read  |  Post a Comment
72% of Black Hat Attendees Expect To Be Hit By 'Major' Data Breach Within A Year
Sara Peters, Senior Editor at Dark ReadingCommentary
End users are the biggest weakness, and we're not doing enough to address the problem.
By Sara Peters Senior Editor at Dark Reading, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
AirbnBreach: How Networks At Short-Term Rentals Are Wide Open To Attack
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New age of community lodging opens the door for old-school network hacks, putting hosts and guests at risk of cyberattacks and stolen personal information.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/13/2016
Comment0 comments  |  Read  |  Post a Comment
What I Expect to See At Black Hat 2016: 5 Themes
Chris Wysopal, CTO, CISO and co-founder, VeracodeCommentary
Over the years, Black Hat has morphed from a little show for security researchers to a big conference that attracts everyone from black-hat hackers to C-level security execs. Here’s what piques my interest this year.
By Chris Wysopal CTO, CISO and co-founder, Veracode, 7/13/2016
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading Launches Best Of Black Hat Awards Program; Finalists Selected
Tim Wilson, Editor in Chief, Dark ReadingCommentary
New awards recognize innovation on Black Hat exhibit floor, including startups, emerging companies, and industry thinkers.
By Tim Wilson Editor in Chief, Dark Reading, 7/12/2016
Comment0 comments  |  Read  |  Post a Comment
Hacking A Penetration Tester
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative
Sara Peters, Senior Editor at Dark ReadingNews
Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.
By Sara Peters Senior Editor at Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
Ripping Away The Mobile Security Blanket
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Upcoming Black Hat USA talk will highlight vulns in Good Technology platform and discuss the dangers of overreliance on enterprise mobility security suites.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
The Newbie’s 'How To Survive Black Hat' Guide
Lysa Myers, Security Researcher, ESETCommentary
There’s little chance you won’t be totally exhausted after “drinking from the information firehose” all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
By Lysa Myers Security Researcher, ESET, 6/29/2016
Comment0 comments  |  Read  |  Post a Comment
Free 'CANSPY' Car-Hacking Tool On Tap
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
French researchers at Black Hat USA will release plug-in tool for testing vehicles for security vulnerabilities.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/27/2016
Comment14 comments  |  Read  |  Post a Comment
Windows 'BadTunnel' Attack Hijacks Network Traffic
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Newly discovered -- and now patched -- Windows design flaw affects all versions of Windows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
10 Newsmakers Who Shaped Security In the Past Decade
Kelly Jackson Higgins, Executive Editor at Dark Reading
In celebration of Dark Reading’s 10th anniversary, we profile ten people whose actions influenced and shaped the trajectory of the industry – for better or for worse -- in the past ten years.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/28/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"