Black Hat USA
August 2-7, 2014
Mandalay Bay, Las Vegas, NV
Black Hat Europe
October 14-17, 2014
Amsterdam Rai, The Netherlands
Event Updates
Black Hat USA 2014: Virtual Reality Check
Black Hat Staff,
Virtualization is the future (and often the present) of large-scale IT, but like any technology, it has its share of flaws and shortcomings. Today, as we near the beginning of Black Hat USA 2014, we highlight three Briefings that explore the world of virtualized systems... more specifically, how to break and/or protect them.
By Black Hat Staff , 7/29/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Danger! High Bandwidth
Black Hat Staff,
Now that the world is basically one giant network, it's kind of mind-blowing to look back at computers from the days before they were so intimately intertwined. But the ubiquity of networking is also our Achilles' heel, which today's trio of Black Hat Briefings amply illustrate with their focus on Internet-based attacks.
By Black Hat Staff , 7/22/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Policy Matters
Black Hat Staff,
Black Hat isn't just hacking and exploits, though that's certainly high on our agenda. Today's trio of Black Hat USA 2014 Briefings center on politics -- big-picture stuff like the real-world effects of the NSA's surveillance, the legal risks facing security researchers, and the freedom of the Internet itself.
By Black Hat Staff , 7/17/2014
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
10 Dramatic Moments In Black Hat History
Ericka Chickowski, Contributing Writer, Dark Reading
From Google hacking to ATM "jackpotting" to the NSA -- Black Hat has had some memorable moments over the years.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/31/2014
Comment3 comments  |  Read  |  Post a Comment
New Mobile Phone '0wnage' Threat Discovered
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Widespread major vulnerabilities discovered in client control software that affect nearly all smartphone platforms: Details to come at Black Hat USA next week.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/31/2014
Comment5 comments  |  Read  |  Post a Comment
Dark Reading Radio: Data Loss Prevention (DLP) Fail
Kelly Jackson Higgins, Senior Editor, Dark ReadingCommentary
Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/29/2014
Comment8 comments  |  Read  |  Post a Comment
Myth-Busting Machine Learning In Security
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat USA presentation to help quell misconceptions and confusion over machine learning methods in today's security tools.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2014
Comment4 comments  |  Read  |  Post a Comment
7 Black Hat Sessions Sure To Cause A Stir
Ericka Chickowski, Contributing Writer, Dark Reading
At Black Hat, researchers will point out the weaknesses in everything from the satellites in outer space to the thermostat in your home.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/22/2014
Comment11 comments  |  Read  |  Post a Comment
Don't Overestimate EMV Protections, Underestimate Card Thief Sophistication
Ericka Chickowski, Contributing Writer, Dark ReadingNews
At Black Hat, an AccessData researcher will offer up a crash course in card payment tech and protections to root out security community misconceptions
By Ericka Chickowski Contributing Writer, Dark Reading, 7/21/2014
Comment2 comments  |  Read  |  Post a Comment
Hacking Your Hotel Room
Brian Prince, Contributing Writer, Dark ReadingNews
At Black Hat USA next month, a researcher will show how to hack your way into controlling everything in a hotel room -- from lighting to television sets.
By Brian Prince Contributing Writer, Dark Reading, 7/18/2014
Comment12 comments  |  Read  |  Post a Comment
Ransomware: 5 Threats To Watch
Kelly Jackson Higgins, Senior Editor, Dark Reading
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/17/2014
Comment13 comments  |  Read  |  Post a Comment
Tapping Into A Homemade Android Army
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat speaker will detail how security researchers can expedite their work across numerous Android devices at once.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/15/2014
Comment2 comments  |  Read  |  Post a Comment
Black Hat USA 2014: Third-Party Vulns Spread Like Diseases
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Understanding the impact of vulnerabilities in libraries and other components
By Ericka Chickowski Contributing Writer, Dark Reading, 7/7/2014
Comment2 comments  |  Read  |  Post a Comment
Researcher Finds Flaws In Key Oracle Security Feature
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Famed security researcher and Oracle database expert David Litchfield next month at Black Hat USA will present details of weaknesses he discovered in a widely touted new security feature in Oracle databases.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/2/2014
Comment0 comments  |  Read  |  Post a Comment
VDI Under The Security Microscope
Brian Prince, Contributing Writer, Dark ReadingNews
Black Hat USA researchers explore security risks with virtual desktop infrastructure with BYOD.
By Brian Prince Contributing Writer, Dark Reading, 6/13/2014
Comment10 comments  |  Read  |  Post a Comment
How Researchers Helped Cripple CryptoLocker
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
A Black Hat USA speaker will give the backstory on how he and others helped disrupt the infamous CyptoLocker operation, and what they learned about it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 6/5/2014
Comment4 comments  |  Read  |  Post a Comment
Dark Reading To Launch Weekly Internet Radio Show
Tim Wilson, Editor in Chief, Dark ReadingCommentary
DR Radio will take place every Wednesday at 1:00 p.m. ET and will feature live chat; first topic will be "A Day in the Life of a Penetration Tester."
By Tim Wilson Editor in Chief, Dark Reading, 5/20/2014
Comment2 comments  |  Read  |  Post a Comment
Black Hat Asia 2014: The Weaponized Web
Dark Reading, News
These Black Hat Briefings explore ways the Web can be weaponized -- and how to defend against them
By Dark Reading , 3/7/2014
Comment0 comments  |  Read  |  Post a Comment
Internet Pioneer And ICANN Chairman Of The Board To Keynote Black Hat Asia 2014
Dark Reading, News
Dr. Steve Crocker has been involved with the Internet since its inception
By Dark Reading , 2/13/2014
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2014: The Internet Of Things
Dark Reading, News
Here are three Briefings from Black Hat Asia 2014 that focus on hacking Net-enabled hardware
By Dark Reading , 2/6/2014
Comment0 comments  |  Read  |  Post a Comment
Can We End CSRF With Header-Based Browser Policies?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Newly proposed Storage Origin Security (SOS) policy presented at Black Hat could offer a simpler way to combat cross-site request forgery
By Ericka Chickowski Contributing Writer, Dark Reading, 8/13/2013
Comment0 comments  |  Read  |  Post a Comment
Attackers' Toolbox Makes Malware Detection More Difficult
Robert Lemos, Technology JournalistNews
From virtual-machine detection to taking a 30-minute nap, the array of techniques used by attackers to stymie malware analysis is growing
By Robert Lemos Technology Journalist, 8/12/2013
Comment0 comments  |  Read  |  Post a Comment
A New Framework For Detecting Advanced Rootkits
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Last week the security community gained another way to help secure endpoints as researchers released a new framework meant to root out rootkits in UEFI
By Ericka Chickowski Contributing Writer, Dark Reading, 8/9/2013
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Register for Dark Reading Newsletters
Current Issue
Cartoon