Black Hat Asia
March 28-31, 2017
Singapore
Black Hat USA
July 22-27, 2017
Las Vegas, NV, USA
Black Hat Europe
December 4-7, 2017
London UK
Event Updates
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Black Hat Staff,
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
By Black Hat Staff , 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Black Hat Staff,
These four steps will help reduce the risk from looming IoT attacks
By Douglas Browne, Managing Director, APAC at Qualys , 3/13/2017
Comment3 comments  |  Read  |  Post a Comment
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Black Hat Staff,
Continually testing for vulnerabilities is critical to threat detection and prevention
By Black Hat Staff , 3/9/2017
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
RAT Vulnerabilities Turn Hackers into Victims
Kelly Sheridan, Associate Editor, Dark ReadingNews
A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors.
By Kelly Sheridan Associate Editor, Dark Reading, 6/23/2017
Comment1 Comment  |  Read  |  Post a Comment
8 Hot Hacking Tools to Come out of Black Hat USA
Ericka Chickowski, Contributing Writer, Dark Reading
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/23/2017
Comment0 comments  |  Read  |  Post a Comment
Nuclear Plants, Hospitals at Risk of Hacked Radiation Monitoring Devices
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security researcher discovers major security flaws that can't be patched or fixed.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/22/2017
Comment0 comments  |  Read  |  Post a Comment
Major Websites Vulnerable to their Own Back-End Servers
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
DoD, other websites found with back-end server flaws and misconfigurations that could give attackers an entryway to internal networks, researcher will demonstrate at Black Hat USA next month.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/19/2017
Comment0 comments  |  Read  |  Post a Comment
Hacker Bypasses Microsoft ATA for Admin Access
Kelly Sheridan, Associate Editor, Dark ReadingNews
Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.
By Kelly Sheridan Associate Editor, Dark Reading, 6/16/2017
Comment2 comments  |  Read  |  Post a Comment
Samsung KNOX Takes Some Knocks
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Researcher at Black Hat USA will reveal Samsung KNOX 2.6 vulnerabilities and bypass techniques, and notes that new KNOX 2.8 may be at risk as well.
By Dawn Kawamoto Associate Editor, Dark Reading, 6/15/2017
Comment0 comments  |  Read  |  Post a Comment
How Bad Data Alters Machine Learning Results
Kelly Sheridan, Associate Editor, Dark ReadingNews
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
By Kelly Sheridan Associate Editor, Dark Reading, 6/13/2017
Comment0 comments  |  Read  |  Post a Comment
Chinese 'Fireball' Malware Infects 20% of Global Corporate Networks
Kelly Sheridan, Associate Editor, Dark ReadingNews
The Fireball malware has infected over 250 million computers and is capable of executing code on all of them, raising potential for large-scale damage.
By Kelly Sheridan Associate Editor, Dark Reading, 6/1/2017
Comment0 comments  |  Read  |  Post a Comment
US Border Policy Shifts May Drive Changes in Laptop Security
Ericka Chickowski, Contributing Writer, Dark ReadingNews
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/2017
Comment10 comments  |  Read  |  Post a Comment
Internet's Security Woes are Not All Technical
Kelly Sheridan, Associate Editor, Dark ReadingNews
Google engineer Halvar Flake told Black Hat Asia attendees that flaws in organizational structure and market power put enterprises at risk.
By Kelly Sheridan Associate Editor, Dark Reading, 3/30/2017
Comment4 comments  |  Read  |  Post a Comment
New Bug Bounty Program Targets IoT Security
Kelly Sheridan, Associate Editor, Dark ReadingNews
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
By Kelly Sheridan Associate Editor, Dark Reading, 2/13/2017
Comment0 comments  |  Read  |  Post a Comment
4G Cellular Networks At Risk Of DoS Attacks
Kelly Sheridan, Associate Editor, Dark ReadingNews
Black Hat Europe researcher shows how hackers can conduct denial-of-service attacks on 4G cellular devices around the world.
By Kelly Sheridan Associate Editor, Dark Reading, 11/7/2016
Comment0 comments  |  Read  |  Post a Comment
Threat Hunting: Going After The Big Game
Dark Reading Staff, CommentaryVideo
The Black Hat News Desk welcomes Jian Zhen from Endgame.
By Dark Reading Staff , 11/3/2016
Comment4 comments  |  Read  |  Post a Comment
Catching Online Scammers, Dealers & Drug Dealers With DNS
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/2/2016
Comment1 Comment  |  Read  |  Post a Comment
Preparing For Government Data Requests After Apple Vs. FBI
Dark Reading Staff, CommentaryVideo
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
By Dark Reading Staff , 10/31/2016
Comment0 comments  |  Read  |  Post a Comment
Partners In The Battle Against Cyberthreats
Dark Reading Staff, CommentaryVideo
George Karidis of CompuCom and Rodel Alejo from Intel stop by the Dark Reading News Desk.
By Dark Reading Staff , 10/6/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hottest Sessions At Black Hat Europe 2016
Sean Martin, CISSP | President, imsmartin
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
By Sean Martin CISSP | President, imsmartin, 9/30/2016
Comment2 comments  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, Dark ReadingNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, Dark Reading, 9/29/2016
Comment1 Comment  |  Read  |  Post a Comment
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Staff, CommentaryVideo
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
By Dark Reading Staff , 9/23/2016
Comment3 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by IdahoseW596
Current Conversations hi there
In reply to: Re: ATM Security
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx