black hat

The vulnerabilities allowed one security researcher to peek inside the leak sites without having to log in.

Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms

Security researchers found a dozen vulnerabilities in 5G baseband chips found in phones made by Google, OPPO, OnePlus, Motorola, and Samsung.

Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say

Rep. Will Hurd will no longer give the keynote address at the Black Hat security conference amid questions about his voting record on women’s rights. Hurd, a Texas Republican congressman,…

Black Hat scraps Rep. Will Hurd as keynote speaker amid voting record controversy

A decision to confirm Rep. Will Hurd as the keynote speaker at the Black Hat security conference this year has prompted anger and concern by some long-time attendees because of…

Rep. Will Hurd to keynote Black Hat draws ire for voting record on women’s rights

Here are four cybersecurity terms that will root many conversations, both on the expo floor and among experts and analysts in the briefing rooms at Black Hat.

The four cybersecurity terms everyone is talking about at Black Hat

Remember Thunderstrike 2? Last summer, Xeno Kovah and Trammell Hudson unveiled several known vulnerabilities affecting the Mac firmware and letting malware creators update the firmware without any way to reset…

Apple Beefs Up Its Security Team By Hiring Security Expert Team

The Thin Black-Clad Line

We live in a cyberpunk novel. Every major nation-state clandestinely develops (and/or purchases) carefully targeted malware, and constantly probes—or penetrates—other nations’ defenses while desperately evaluating their offensive capabilities. Criminal undergrounds…

The Thin Black-Clad Line

Greetings from the gaudy hellscape of Las Vegas, and that overcrowded maelstrom of surly hackers known as DEF CON! What follows is a brief rundown of the talks here (and…

Hack The Planet! (Before It’s Too Late)

It’s Black Hat season, meaning that we are getting a new batch of zero-day exploits showing how insecure our gadgets are. Xeno Kovah and Trammell Hudson found a serious zero-day…

New Zero-Day Exploit Can Completely Brick Your Mac

So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societies,…

Notes From Crazytown, Day Three: Black Hat Breakdown

Can your computer be hacked? Yep. Can your phone be hacked? Yep. Have your passwords been harvested? Very possibly. (The NYT just reported that one Russian group has more than…

Notes From Crazytown, Day One: The Business Of Fear

What Happens At Def Con Stays With Us All

There’s nothing like attendance at the annual Black Hat and DefCon security/hacker conferences to hike your paranoia into the red zone and keep it there forever. You come away with…

What Happens At Def Con Stays With Us All

NSA Director: Don’t Worry, Trust Us

General Keith Alexander, head of the NSA, gave the keynote speech at the Black Hat security conference in Las Vegas today. It was more interesting than I expected. Not for…

NSA Director: Don’t Worry, Trust Us
Hardware

Think your satellite dish is secure? It's not.

From TV to internet, most people think that their satellite dish connection is secure and unhackable. Well, it’s not. Using equipment that he built himself for under $1000, UK resident…

Three French journalists were kicked out of the Black Hat security conference in Las Vegas yesterday. They were caught sniffing the press room’s Wi-Fi network. The journalists were from the…