Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat USA 2016: Beware of Malware
Black Hat Staff,
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
By Black Hat Staff , 6/30/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Windows Security
Black Hat Staff,
Microsoft’s Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
By Black Hat Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Digital Communication Security
Black Hat Staff,
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study “Digital in 2016” by We Are Social). Since a large portion of the world’s population communicates using the internet, cyber security is a priority for users.
By Black Hat Staff , 6/6/2016
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Improving Attribution & Malware Identification With Machine Learning
Sara Peters, Senior Editor at Dark ReadingNews
New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.
By Sara Peters Senior Editor at Dark Reading, 7/20/2016
Comment0 comments  |  Read  |  Post a Comment
72% of Black Hat Attendees Expect To Be Hit By 'Major' Data Breach Within A Year
Sara Peters, Senior Editor at Dark ReadingCommentary
End users are the biggest weakness, and we're not doing enough to address the problem.
By Sara Peters Senior Editor at Dark Reading, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
AirbnBreach: How Networks At Short-Term Rentals Are Wide Open To Attack
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New age of community lodging opens the door for old-school network hacks, putting hosts and guests at risk of cyberattacks and stolen personal information.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/13/2016
Comment0 comments  |  Read  |  Post a Comment
What I Expect to See At Black Hat 2016: 5 Themes
Chris Wysopal, CTO, CISO and co-founder, VeracodeCommentary
Over the years, Black Hat has morphed from a little show for security researchers to a big conference that attracts everyone from black-hat hackers to C-level security execs. Here’s what piques my interest this year.
By Chris Wysopal CTO, CISO and co-founder, Veracode, 7/13/2016
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading Launches Best Of Black Hat Awards Program; Finalists Selected
Tim Wilson, Editor in Chief, Dark ReadingCommentary
New awards recognize innovation on Black Hat exhibit floor, including startups, emerging companies, and industry thinkers.
By Tim Wilson Editor in Chief, Dark Reading, 7/12/2016
Comment0 comments  |  Read  |  Post a Comment
Hacking A Penetration Tester
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative
Sara Peters, Senior Editor at Dark ReadingNews
Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.
By Sara Peters Senior Editor at Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
Ripping Away The Mobile Security Blanket
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Upcoming Black Hat USA talk will highlight vulns in Good Technology platform and discuss the dangers of overreliance on enterprise mobility security suites.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/7/2016
Comment1 Comment  |  Read  |  Post a Comment
The Newbie’s 'How To Survive Black Hat' Guide
Lysa Myers, Security Researcher, ESETCommentary
There’s little chance you won’t be totally exhausted after “drinking from the information firehose” all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
By Lysa Myers Security Researcher, ESET, 6/29/2016
Comment0 comments  |  Read  |  Post a Comment
Free 'CANSPY' Car-Hacking Tool On Tap
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
French researchers at Black Hat USA will release plug-in tool for testing vehicles for security vulnerabilities.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/27/2016
Comment14 comments  |  Read  |  Post a Comment
Windows 'BadTunnel' Attack Hijacks Network Traffic
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Newly discovered -- and now patched -- Windows design flaw affects all versions of Windows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
10 Newsmakers Who Shaped Security In the Past Decade
Kelly Jackson Higgins, Executive Editor at Dark Reading
In celebration of Dark Reading’s 10th anniversary, we profile ten people whose actions influenced and shaped the trajectory of the industry – for better or for worse -- in the past ten years.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/28/2016
Comment0 comments  |  Read  |  Post a Comment
15 Cybersecurity Lessons We Should Have Learned From 2015, But Probably Didn't
Sara Peters, Senior Editor at Dark ReadingNews
Another infosec year is almost in the books. What did all the breaches, vulnerabilities, trends, and controversies teach us?
By Sara Peters Senior Editor at Dark Reading, 12/28/2015
Comment7 comments  |  Read  |  Post a Comment
The Youthful Side Of Hacking
Peter Gyongyosi, Product Manager, BalabitCommentary
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
By Peter Gyongyosi Product Manager, Balabit, 11/25/2015
Comment11 comments  |  Read  |  Post a Comment
We Need A New Word For Cyber
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
It’s time to find an alternative for 'cyber' (an adjective or noun) before the term – like 'google' -- becomes a verb.
By John B. Dickson CISSP, Principal, Denim Group, 11/23/2015
Comment6 comments  |  Read  |  Post a Comment
Solving Security: If You Want Something New, Stop Doing Something Old
Marilyn Cohodas, Community Editor, Dark ReadingNews
Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite.
By Marilyn Cohodas Community Editor, Dark Reading, 11/12/2015
Comment0 comments  |  Read  |  Post a Comment
New 4G LTE Hacks Punch Holes In Privacy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat Europe researchers to demonstrate newly found flaws in 4G mobile that expose privacy and disrupt phone service.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
By Marilyn Cohodas Community Editor, Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
AndroBugs: A Framework For Android Vulnerability Scanning
Sara Peters, Senior Editor at Dark ReadingNews
At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.
By Sara Peters Senior Editor at Dark Reading, 11/4/2015
Comment0 comments  |  Read  |  Post a Comment
How Hackers Can Hack The Oil & Gas Industry Via ERP Systems
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe next month will demonstrate how SAP applications can be used as a stepping-stone to sabotage oil & gas processes.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/28/2015
Comment3 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by raijakson
Current Conversations good post
In reply to: Re: Flash
Post Your Own Reply
Posted by saiopen
Current Conversations nice post
In reply to: Re: interesting video
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Cartoon Contest