Kazakhstan accused of hacking journos, activists by EFF Black Hat Malware Learnings Make Hideous Detriment People of Kazakhstan Security05 Aug 2016 | 2
Hackers unleash smart Twitter phishing tool that snags two in three users Black Hat Just. Don't. Click. On. Dodgy. ShortURLs. People. Security05 Aug 2016 | 27
How the HTTPS-snooping, email addy and SSN-raiding HEIST JavaScript code works Black Hat No middleman required to ding sites for info Security05 Aug 2016 | 27
Apple joins the bug bounty party with $200,000 top prize Black Hat Cupertino will match bounties if hackers donate them to charity Security05 Aug 2016 | 10
Jeep hackers: How we swerved past Chrysler's car security patches Black Hat Clue: It involves physically breaking into a ride this time Security04 Aug 2016 | 32
Top infosec top bods praise and damn in Pwnie Awards Black Hat Remember (Sad)Badlock? They do Security04 Aug 2016 | 2
Hackers detail the blood and guts of the 2016 Pwn2Own exploit expo Black Hat Kernel carnage bashes browsers and punishes plug-ins Security04 Aug 2016 | 4
Users of secure chat app Telegram popped after possible nation-state attack Black Hat Iran's government suspected of cracking down on encrypted comms Security04 Aug 2016 | 5
Forget security training, it's never going to solve Layer 8 (aka people) Black Hat Human curiosity will always trump anti-phishing schemes Security03 Aug 2016 | 51
Black Hats control Jeep's steering, kill brakes Black Hat video Tiny device could drive remote CAN bus assassinations Security02 Aug 2016 | 23
Google, Facebook's CAPTCHAs vanquished by security researchers Black Hat Asia Another middle-class job gone as CAPTCHA-crackers beaten Security07 Apr 2016 | 16
Hackers demo persistent, quiet attacks through Windows DSC AUDIO from Black Hat Asia Desired State Configuration tool can create state of chaos OSes05 Apr 2016 |
Spies rejoice! Gmail, Facebook Messenger BREACHed once again Black Hat Asia Thrice-upgraded attack framework now 500 times faster with badass modular Rupture framework Security04 Apr 2016 | 11
Top Firefox extensions can hide silent malware using easy pre-fab tool Black Hat Asia The fix? No patch, just destroy all extensions. Security04 Apr 2016 | 41
Hacker reveals $40 attack that steals police drones from 2km away Black Hat Asia No encryption in pro-grade drones: just sniff Wi-Fi and copy signals Security01 Apr 2016 | 19
Android's unpatched dead device jungle is good for security Black Hat Asia 'Attackers can't just use one exploit to pwn a billion devices' says Square's security lead Security31 Mar 2016 | 29
Alleged Ukrainian botnet herder faces 43 years after Italian job snafu Hacker fingered for heroin stunt takes the stand Security13 Oct 2015 | 3
Ten years after the sellout, Black Hat is solidly corporate and that’s fine Analysis DEF CON is hopefully never going to change Channel11 Aug 2015 | 7
Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it Black Hat In-Depth Howler opens door for SMM rootkits Security11 Aug 2015 | 135
Borg blacklist assimilates Cryptolocker domain name generators Scrabble dictionary used to out randomly-generated malware-hosting domain names Security10 Aug 2015 | 9
HTC caught storing fingerprints AS WORLD-READABLE CLEARTEXT Android biometric banks more Fort Nope than Fort Knox. Security10 Aug 2015 | 44
Ransacked US OPM wins Pwnie Award for 'Most EPIC Fail' Black Hat 2015 Kicking a government when it's down Security06 Aug 2015 |
How the Arab Spring blew the lid off the commercial spyware Black Hat 2015 And how the US government is screwing the pooch with Wassenaar Legal06 Aug 2015 | 5
Hacker-friendly Chrysler hauled into court for class-action showdown Black Hat 2015 Should have fixed this remote-control vulnerability last year, peeps Security06 Aug 2015 | 14
Researchers look sideways to crack SIM card AES-128 encryption Black Hat 2015 Gone in ten minutes, with a little help from some exotic hardware Security06 Aug 2015 | 18
IT security staff have a job for life – possibly a grim, frustrating life Black Hat 2015 Black Hat founder warns of coming crisis Security05 Aug 2015 | 15
Got an Android phone? SMASH IT with a hammer – and do it NOW Up to a BEELLION mobes vulnerable to Stagefright bug Security27 Jul 2015 | 137
FLASH drive ... Ah-aaaaaah! BadUSB no saviour to plug and play Universe Serious flaws demonstrated by researchers Security03 Oct 2014 | 28
'Up to two BEEELLION' mobes easily hacked by evil base stations Black Hat 2014 videos Android, BlackBerry, and Apple fall to OMA-DM flaw – claim Security08 Aug 2014 | 12
Watch this Aussie infosec bod open car doors from afar Homes unlocked now car doors popped Security06 Aug 2014 | 24
One in 2900 phone calls is an IDENTITY THIEF Breached citizen ID numbers used in painful IVR brute force attacks Security06 Aug 2014 |
White Hats splat Black Hat chats: Talks on home alarm flaws and Russian spy tools axed Three presentations now pulled from hacking shindig Security05 Aug 2014 | 9
Multipath TCP speeds up the internet so much that security breaks Black Hat research says proposed protocol will bork network probes, flummox firewalls Security31 Jul 2014 | 35
Tor attack nodes RIPPED MASKS off users for 6 MONTHS Traffic confirmation attack bared users' privates - but to whom? Security30 Jul 2014 | 28
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert Exodus vows not to sell secrets of whistleblower's favorite OS Security21 Jul 2014 | 11
Redmond's EMET defense tool disabled by exploit torpedo With latest version shot to pieces, work begins on beta bomb Security02 Jul 2014 | 11
FTC seeks DEFCON help to finger illegal robocallers Plans cash-money honeypot competition in August Security17 Jun 2014 | 17
Google researcher says government hack attacks on journos on the rise Everyone's a target, it seems Security30 Mar 2014 | 6
Forget black hats – the best hackers are going grey and getting legit Bug bounties make going legit a tempting proposition Security25 Mar 2014 | 6
Want to remotely control a car? $20 in parts, some oily fingers, and you're in command Plug 'n play for the automotive hacking community Personal Tech06 Feb 2014 | 49
Mobe networks hacked phones to fix SIM hijack flaw, says bug-finder Bloke keeps schtum after JavaCard weakness exploited to squash it Networks05 Aug 2013 | 18
Snowden picks up 'Epic 0wnage' gong in Vegas... well, not literally And Barnaby Jack wins posthumous lifetime achievement Pwnie Security02 Aug 2013 | 5
Pacemaker hack legend Barnaby Jack dies just before Black Hat revelations Tributes flood in for security titan Security26 Jul 2013 | 29
Femtocell flaw leaves Verizon subscribers' Wi-Fi and mobile wide open Not just Verizon: Up to 30 carriers at risk Security15 Jul 2013 | 10
Feds BANNED from DEF CON by founder (who is Obama's cyber-expert) DEF CON 21 And presumably uninvites himself? Security12 Jul 2013 | 21
Microsoft breaks bug-bounty virginity in $100,000 contest Black Hat sets phasers to stun on Windows 8.1 and Internet Explorer 11 Security19 Jun 2013 | 27
Apple security team adds British white hat hacking talent From Redmond to Cupertino for Kristin Paget Security06 Dec 2012 | 5
Hotel blames burglaries on hacked Onity card locks Updated Black Hat demo exploited in the wild Security27 Nov 2012 | 26
SEC staffers slammed for serious security snafus Took unsecured laptops to Black Hat hacker's soirée Security09 Nov 2012 | 8
Republican filibuster blocks Senate Cybersecurity bill Online security includes abortion rights it seems Security02 Aug 2012 | 29
Apple disappoints at first Black Hat briefing Black Hat 2012 Rehashes old info and scarpers before question time Security27 Jul 2012 | 33
Stuxnet: 'Moral crime' or proportionate response? Security experts split on cyberwar Security26 Jul 2012 | 46
Neal Stephenson on swordplay, space and depressing SF Black Hat 2012 Teases computer game, Snow Crash film at Black Hat keynote Legal26 Jul 2012 | 43
Kaminsky takes on censorship with info-mapping tools Black Hat 2012 Wants to transparency to provoke debate Security26 Jul 2012 | 12
Forget widgets, invest in staff say Black Hat alumni Black Hat 2012 Planning for the next 15 years of security Security25 Jul 2012 | 7
Foreign intelligence agencies are biggest online threat, ex-Fed warns Black Hat 2012 Pot, meet the kettle of color – allegedly Security25 Jul 2012 | 22
Black Hat draws world hacking gang – and Apple – to Sin City Black Hat 2012 New faces, and a few old ones Security25 Jul 2012 | 5
Self-pwned: Black Hat says soz for phishing attack scare Black Hat conference Looked like phish, smelled like phish, but was just a cock-up Security23 Jul 2012 | 6
Feds turn one in four black-hat hackers into snitches Cracktivists beware... Security07 Jun 2011 | 16
Flaw could expose 'millions' of home routers Rebind variant plays Jedi mind trick on home comms kit Channel19 Jul 2010 | 49