Vulnerabilities / Threats // Advanced Threats
8/4/2014
04:24 PM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Dark Reading Plans Special Coverage Of Black Hat USA 2014

Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.

LAS VEGAS, NEVADA — The Black Hat USA 2014 conference is under way here this week, and Dark Reading is preparing a broad range of special coverage for this year's show.

To begin with, we have already posted more than 30 session previews, speaker announcements, radio show broadcasts, and other items about the show. You'll find all of our show coverage -- both today and all through this exciting week -- on Dark Reading's special Black Hat News page, which is now a regular feature of the Dark Reading site. On this page, you will find a constant stream of news from the show, including news stories, interviews, and onsite commentary from our editorial team and from expert contributors who are here in Las Vegas.

On Tuesday, editors Kelly Jackson Higgins and Tim Wilson will be doing live interviews with top security industry speakers at the annual Black Hat Executive Summit, an invitation-only gathering of IT security exectives from around the globe. Among the interviews are Phyllis Schneck, Deputy Under Secretary for Cybersecurity at the Department of Homeland Security's National Protection and Programs Directorate; Rod Beckstrom, Chief Security Advisor at Samsung and former President and CEO of ICANN; and Paul Vixie, CEO of Farsight and member of the Internet Hall of Fame.

On Wednesday and Thursday, the Dark Reading team will launch the first-ever edition of its Black Hat Radio program, which will offer live interviews with top speakers from the conference. Among the interviews are Jim Reavis, co-founder of the Cloud Security Alliance and Tom Cross, Director of Security Research at Lancope, who will discuss their presentations at Black Hat. Check the Dark Reading Radio section of the DR homepage for the latest schedule of radio shows and interviews.

On Thursday, Dark Reading will sponsor two special workshops on security research: The Future of Responsible Disclosure and Attribution: What It Means For Enterprise Security. The disclosure panel will focus on how researchers reveal security vulnerabilities and features experts Tod Beardsley of Rapid7 and Metasploit; Dino Dai Zovi of @ Square; Vinnie Liu of Bishop Fox; and Katie Moussouris of HackerOne. The attribution panel will focus on the nature and value of identifying your attacker and features Adam Meyers of CrowdStrike; Chris Nutt of Mandiant/FireEye; Chris Porter of the Verizon Cyber Intelligence Center; and Lucas Zaichkowsky of AccessData.

On Tuesday, Wednesday and Thursday, Dark Reading will send out a daily newsletter to its subscribers as well as Black Hat conference attendees. The newsletter, which will feature show-focused news and commentary as well as highlights of each day's Black Hat events, will be mailed automatically to Dark Reading newsletter subscribers. If you have not subscribed and would like to receive the newsletters, you can sign up here.

During the course of this Black Hat week, as well as later this month, Dark Reading will add many more news stories, columns, slide shows, photos, and radio broadcasts to its archive of Black Hat coverage. For all the latest from the show, as well as the opportunity to comment and add to the discussion, keep an eye on Dark Reading in the days ahead. We look forward to the conference!

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.