Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
Event Updates
Learn to Safeguard Critical Industrial Targets at Black Hat USA
Black Hat Staff,
Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.
By Black Hat Staff , 8/2/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA Offers Inside Look at Boeing 787 Security Flaws
Black Hat Staff,
The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this years August event.
By Black Hat Staff , 7/24/2019
Comment0 comments  |  Read  |  Post a Comment
Crack the Defenses of iOS and other Platforms at Black Hat USA
Black Hat Staff,
Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference.
By Black Hat Staff , 7/19/2019
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Project Zero Turns 5: How Google's Zero-Day Hunt Has Grown
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Black Hat USA, Project Zero's team lead shared details of projects it has accomplished and its influence on the security community.
By Kelly Sheridan Staff Editor, Dark Reading, 8/16/2019
Comment1 Comment  |  Read  |  Post a Comment
5 Things to Know About Cyber Insurance
Joan Goodchild, Contributing Writer
More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.
By Joan Goodchild Contributing Writer, 8/15/2019
Comment3 comments  |  Read  |  Post a Comment
Researchers Show How SQLite Can Be Modified to Attack Apps
Jai Vijayan, Contributing WriterNews
New technique involves query hijacking to trigger a wide range of memory safety issues within the widely used database engine, Check Point says.
By Jai Vijayan Contributing Writer, 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
Significant Vulnerabilities Found in 6 Common Printer Brands
Robert Lemos, Contributing WriterNews
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
By Robert Lemos Contributing Writer, 8/9/2019
Comment0 comments  |  Read  |  Post a Comment
How Behavioral Data Shaped a Security Training Makeover
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new program leveraged behavioral data of employees to determine when they excelled at security and where they needed improvement.
By Kelly Sheridan Staff Editor, Dark Reading, 8/8/2019
Comment0 comments  |  Read  |  Post a Comment
Equifax CISO: 'Trust Starts and Ends with You'
Jai Vijayan, Contributing WriterNews
Organizational culture is key to good enterprise security posture, Jamil Farshchi told Black Hat attendees.
By Jai Vijayan Contributing Writer, 8/8/2019
Comment0 comments  |  Read  |  Post a Comment
Siemens S7 PLCs Share Same Crypto Key Pair, Researchers Find
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat USA reveal how security authentication weaknesses in popular Siemens ICS family let them control a PLC.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/8/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
WhatsApp Messages Can Be Intercepted, Manipulated
Jai Vijayan, Contributing WriterNews
Check Point security researchers demonstrate how a dangerous security weakness in the messaging application can be abused to spread fake news and carry out online scams.
By Jai Vijayan Contributing Writer, 8/8/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat 2019: Security Culture Is Everyone's Culture
Kelly Sheridan, Staff Editor, Dark ReadingNews
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.
By Kelly Sheridan Staff Editor, Dark Reading, 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Show Vulnerabilities in Facial Recognition
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
Mimecast Rejected Over 67 Billion Emails. Here's What It Learned
Steve Zurier, Contributing WriterNews
New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.
By Steve Zurier Contributing Writer, 8/6/2019
Comment3 comments  |  Read  |  Post a Comment
Ransomware Used in Multimillion-Dollar Attacks Gets More Automated
Jai Vijayan, Contributing WriterNews
The authors of MegaCortex appear to have traded security for convenience and speed, say researchers at Accenture iDefense.
By Jai Vijayan Contributing Writer, 8/5/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Opens Azure Security Lab, Raises Top Azure Bounty to $40K
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft has invited security experts to 'come and do their worst' to mimic cybercriminals in the Azure Security Lab.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat: A Summer Break from the Mundane and Controllable
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.
By John B. Dickson CISSP, Principal, Denim Group, 8/2/2019
Comment0 comments  |  Read  |  Post a Comment
8 Free Tools to Be Showcased at Black Hat and DEF CON
Ericka Chickowski, Contributing Writer
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
By Ericka Chickowski Contributing Writer, 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Cracking Apple's T2 Security Chip
Black Hat Staff,  News
Duo Labs Mikhail Davidow and Jeremy Erickson speak about their research on the Apples T2 security chip, and why theyre sharing it at Black Hat USA.
By Alex Wawro, Special to Dark Reading , 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Inside the Black Hat NOC
Black Hat Staff,  News
Cybersecurity expert Bart Stump explains what its like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.
By Alex Wawro, Special to Dark Reading , 7/26/2019
Comment0 comments  |  Read  |  Post a Comment
Security Training That Keeps Up with Modern Development
Ericka Chickowski, Contributing WriterNews
Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.
By Ericka Chickowski Contributing Writer, 7/25/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 20 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Cartoon Contest