Black Hat Europe
December 4-7, 2017
London UK
Black Hat Asia
March 20-23, 2018
Singapore
Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Event Updates
Black Hat Asia 2018:
First Briefings Announced
Black Hat Staff,
Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
By Black Hat Staff , 12/13/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2017:
Deep Dive Into Crypto Vulnerabilities
Black Hat Staff,
By Black Hat Staff , 11/6/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2017:
New Briefings Announced
Black Hat Staff,
Final Batch of Black Hat Europe 2017 Briefings Released
By Black Hat Staff , 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Why Cybersecurity Must Be an International Effort
Kelly Sheridan, Associate Editor, Dark ReadingNews
The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.
By Kelly Sheridan Associate Editor, Dark Reading, 12/6/2017
Comment1 Comment  |  Read  |  Post a Comment
How the Major Intel ME Firmware Flaw Lets Attackers Get 'God Mode' on a Machine
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.'
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/6/2017
Comment0 comments  |  Read  |  Post a Comment
Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Researcher to reveal IoT medical device dangers at Black Hat Europe this week.
By Dawn Kawamoto Associate Editor, Dark Reading, 12/4/2017
Comment2 comments  |  Read  |  Post a Comment
Intel Firmware Flaws Found
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Another big firmware security issue affecting Intel processors, requires OEM updates.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/22/2017
Comment0 comments  |  Read  |  Post a Comment
Samsung Pay Leaks Mobile Device Information
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Researcher at Black Hat Europe will show how Samsung Pay's security falls short and ways attackers could potentially bypass it.
By Dawn Kawamoto Associate Editor, Dark Reading, 11/22/2017
Comment0 comments  |  Read  |  Post a Comment
Stealthy New PLC Hack Jumps the Air Gap
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/9/2017
Comment0 comments  |  Read  |  Post a Comment
Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns
Kelly Sheridan, Associate Editor, Dark ReadingNews
Researchers investigate the tools and techniques behind cyber propaganda and fake news and how it changes public opinion.
By Kelly Sheridan Associate Editor, Dark Reading, 11/6/2017
Comment1 Comment  |  Read  |  Post a Comment
Social Engineer Spills Tricks of the Trade
Kelly Sheridan, Associate Editor, Dark ReadingNews
A social engineer points out gaping holes in businesses' human security and shares lessons learned from years of phishing research.
By Kelly Sheridan Associate Editor, Dark Reading, 11/2/2017
Comment0 comments  |  Read  |  Post a Comment
Secure Wifi Hijacked by KRACK Vulns in WPA2
Jai Vijayan, Freelance writerNews
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
By Jai Vijayan Freelance writer, 10/16/2017
Comment2 comments  |  Read  |  Post a Comment
How Security Metrics Fail Us & How We Fail Them
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
By Sara Peters Senior Editor at Dark Reading, 9/26/2017
Comment3 comments  |  Read  |  Post a Comment
Attacking Developers Using 'Shadow Containers'
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
By Sara Peters Senior Editor at Dark Reading, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
A New Model for 'Mathematically Provable Security'
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
Winn Schwartau, CEO of The Security Awareness Company, says we all know the old model of security is broken and it's time for a new one.
By Tim Wilson, Editor in Chief, Dark Reading , 9/14/2017
Comment1 Comment  |  Read  |  Post a Comment
Deception: A Convincing New Approach to Cyber Defense
Ofer Israeli, CEO & Founder, Illusive NetworksCommentary
How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.
By Ofer Israeli CEO & Founder, Illusive Networks, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Tesla Hacks: The Good, The Bad, & The Ugly
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
By Sara Peters Senior Editor at Dark Reading, 9/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Paul Vixie: How CISOs Can Use DNS to Up Security
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
FarSight CEO and DNS master Paul Vixie explains how enterprises, not just telecoms and infrastructure providers, can use DNS to improve cybersecurity.
By Tim Wilson, Editor in Chief, Dark Reading , 9/11/2017
Comment0 comments  |  Read  |  Post a Comment
Attacking Data Integrity & Hacking Radiation Monitoring Devices
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ruben Santamarta shows radio-based vulnerabilities and investigates how the integrity of critical data can be manipulated to simulate, complicate or exacerbate emergency situations.
By Sara Peters Senior Editor at Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
How Legendary Carder, Hacker Roman Seleznev Was Caught, Sentenced
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Assistant US Attorney Norman Barbosa visits the Dark Reading News Desk to discuss details of the credit card hacking case that led to an unprecedented 27-year prison sentence.
By Sara Peters Senior Editor at Dark Reading, 9/6/2017
Comment0 comments  |  Read  |  Post a Comment
Activists Beware: The Latest In 3G & 4G Spying
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ravi Borgaonkar describes new 3G & 4G vulnerabilities that enable IMSI catchers to be smarter, stealthier snoopers.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
To Improve Diversity, 'Have the Uncomfortable Conversations'
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jules Okafor of Fortress Information Security explains that diversity efforts cannot shy away from discussions of racism and sexism.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
Mikko Hypponen's Vision of the Cybersecurity Future
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
By Sara Peters Senior Editor at Dark Reading, 9/4/2017
Comment2 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by annamarsh
Current Conversations nice post.
In reply to: Info
Post Your Own Reply
Posted by nisabila50
Current Conversations interesting and useful. thanks
In reply to: rara
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!!