Black Hat Asia
March 24-27, 2015
Marina Bay Sands, Singapore
Event Updates
Black Hat Asia 2015: Android Assault
Black Hat Staff,
Black Hat Asia 2015 is just over two months away, so it's high time to start exploring the numerous exciting Black Hat Briefings that'll be on offer. Black Hat's signature Briefings offer an oft-imitated, seldom equaled combo of hardcore technical insights presented by world-class experts, but you probably knew that. Today's inaugural trio of Briefings all touch on Google's incredibly popular mobile operating system …
By Black Hat Staff , 1/22/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2015: One of Everything
Black Hat Staff,
Our fifth and final Black Hat Asia 2015 Training update brings word of a potpourri of hands-on topics. Between coding fuzzers, hacking software-defined radio, and assembling custom pentest gadgets, there's something here for everyone. Well, everyone who'd come to a Black Hat event, anyway.
By Black Hat Staff , 1/20/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2015: Bread & Butter
Black Hat Staff,
When you hear Black Hat, the one word you tend to think of is... well, OK, maybe "security." But hacking is surely a close second. This Black Hat Asia 2015 intel update highlights just why, with two key Trainings that cover attack vectors, tools, and techniques.
By Black Hat Staff , 1/15/2015
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
The Internet of Things: 7 Scary Security Scenarios
Marilyn Cohodas, Community Editor, Dark Reading
The IoT can be frightening when viewed from the vantage point of information security.
By Marilyn Cohodas Community Editor, Dark Reading, 10/16/2014
Comment9 comments  |  Read  |  Post a Comment
Smart Meter Hack Shuts Off The Lights
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
European researchers will reveal major security weaknesses in smart meters that could allow an attacker to order a power blackout.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/1/2014
Comment5 comments  |  Read  |  Post a Comment
Black Hat & DEF CON: 3 Lessons From A Newbie
Kerstyn Clover, Attack & Defense Team ConsultantCommentary
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
By Kerstyn Clover Attack & Defense Team Consultant, 9/9/2014
Comment8 comments  |  Read  |  Post a Comment
All In For The Coming World of 'Things'
Don Bailey, Founder & CEO, Lab Mouse SecurityCommentary
At a Black Hat round table, experts discuss the strategies necessary to lock down the Internet of Things, the most game-changing concept in Internet history.
By Don Bailey Founder & CEO, Lab Mouse Security, 8/25/2014
Comment6 comments  |  Read  |  Post a Comment
Access Point Pinched From Black Hat Show WLAN
Kelly Jackson Higgins, Executive Editor at Dark ReadingCommentary
A few apparent pranks, practice DDoS attacks, and other mischievous activities were spotted on the Black Hat USA wireless network in Las Vegas this month.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/19/2014
Comment4 comments  |  Read  |  Post a Comment
Hacker Couture: As Seen At Black Hat USA, BSides, DEF CON
Kelly Jackson Higgins, Executive Editor at Dark Reading
'Leet tattoos, piercings, mega-beards, (the real) John McAfee, and even a cute puppy were among the colorful sights in Las Vegas this month.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/18/2014
Comment14 comments  |  Read  |  Post a Comment
Traffic To Hosting Companies Hijacked In Crypto Currency Heist
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Attacker likely a current or former ISP employee, researchers say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/14/2014
Comment2 comments  |  Read  |  Post a Comment
Tech Insight: Hacking The Nest Thermostat
John H. Sawyer, Contributing Writer, Dark ReadingNews
Researchers at Black Hat USA demonstrated how they were able to compromise a popular smart thermostat.
By John H. Sawyer Contributing Writer, Dark Reading, 8/14/2014
Comment6 comments  |  Read  |  Post a Comment
Internet Of Things Security Reaches Tipping Point
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Public safety issues bubble to the top in security flaw revelations.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2014
Comment11 comments  |  Read  |  Post a Comment
Security Holes Exposed In Trend Micro, Websense, Open Source DLP
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers Zach Lanier and Kelly Lum at Black Hat USA took the wraps off results of their security testing of popular data loss prevention software.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/12/2014
Comment5 comments  |  Read  |  Post a Comment
CloudBot: A Free, Malwareless Alternative To Traditional Botnets
Sara Peters, Senior Editor at Dark ReadingNews
Researchers take advantage of cloud service providers' free trials and lousy anti-automation controls to use cloud instances like bots.
By Sara Peters Senior Editor at Dark Reading, 8/11/2014
Comment1 Comment  |  Read  |  Post a Comment
No Fixes In Sight For Satellite Terminal Flaws
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
At Black Hat USA, a researcher who in April revealed weaknesses in popular satellite ground terminal equipment found on air, land and sea, demonstrates possible attack scenarios.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2014
Comment2 comments  |  Read  |  Post a Comment
Heartbleed, GotoFail Bring Home Pwnie Awards
Sara Peters, Senior Editor at Dark ReadingQuick Hits
The Pwnie Awards celebrate the best bug discoveries and worst security fails.
By Sara Peters Senior Editor at Dark Reading, 8/7/2014
Comment5 comments  |  Read  |  Post a Comment
Attack Harbors Malware In Images
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
'Lurk' click-fraud campaign now employing steganography.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2014
Comment0 comments  |  Read  |  Post a Comment
When Good USB Devices Go Bad
Brian Prince, Contributing Writer, Dark ReadingNews
Researchers offer more details about how USB devices can be leveraged in attacks.
By Brian Prince Contributing Writer, Dark Reading, 8/7/2014
Comment1 Comment  |  Read  |  Post a Comment
Dan Geer Touts Liability Policies For Software Vulnerabilities
Sara Peters, Senior Editor at Dark ReadingNews
Vendor beware. At Black Hat, Dan Geer suggests legislation to change product liability and abandonment rules for vulnerable and unsupported software.
By Sara Peters Senior Editor at Dark Reading, 8/6/2014
Comment6 comments  |  Read  |  Post a Comment
TSA Checkpoint Systems Found Exposed On The Net
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher Billy Rios exposes new threats to airport security systems.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/6/2014
Comment2 comments  |  Read  |  Post a Comment
A Peek Inside The Black Hat Show Network
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat USA's wireless network offers authenticated, secure access as well as 'open' access.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/5/2014
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Plans Special Coverage Of Black Hat USA 2014
Tim Wilson, Editor in Chief, Dark ReadingCommentary
Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.
By Tim Wilson Editor in Chief, Dark Reading, 8/4/2014
Comment0 comments  |  Read  |  Post a Comment
The World's Most Hackable Cars
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers find 2014 models of Dodge Viper, Audi A8, Honda Accord are the least likely to be hit by hackers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/2/2014
Comment25 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Register for Dark Reading Newsletters
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Cartoon