Black Hat shines light on security (roundup)

Las Vegas is the setting this week for two of the most popular annual security events. First comes Black Hat for the professional crowd, followed by the more antic Defcon gathering.

Las Vegas is the setting this week for two of the most popular annual security events. First comes Black Hat for the professional crowd, followed by the more antic Defcon gathering.

Researcher detained at U.S. border, questioned about Wikileaks

Jacob Appelbaum, who volunteers with Wikileaks, is questioned for three hours and has mobile phones confiscated on his way back to the U.S. for hacker show.
(Posted in InSecurity Complex by Elinor Mills)
July 31, 2010 4:16 PM PDT

Contest finds workers at big firms handing data to hackers

Organizers of contest at hacking confab hope showing how easy it is to get data from cold calls to companies will help alert firms to the threat of social engineering.
(Posted in InSecurity Complex by Elinor Mills)
July 31, 2010 10:53 AM PDT

Tighter security coming in Firefox 4

At Black Hat, a trio of security representatives from Mozilla detailed how the company plans to push the browser to be more secure for users while nudging developers toward safer coding practices.
(Posted to CNET Download by Seth Rosenblatt)
July 30, 2010 5:03 PM PDT

Can your calls be intercepted? This tool can tell

Airprobe software, combined with hardware and crypto cracker tool, allows people to test the snoop factor of their GSM mobile phones--and even intercept calls of others.
(Posted in InSecurity Complex by Elinor Mills)
July 29, 2010 3:44 PM PDT

U.S. military cyberwar: What's off-limits?

Ex-NSA and CIA head tells Black Hat crowd that rules for when military can attack foreign networks might exempt power grids and financial networks.
(Posted in Privacy Inc. by Declan McCullagh)
July 29, 2010 1:43 PM PDT

Black Hat
Black Hat

Searchable Facebook user data posted to Pirate Bay

The names and Facebook profile Web addresses for 171 million accounts are scraped from the site and posted on file-sharing site Pirate Bay.
(Posted in InSecurity Complex by Elinor Mills)
July 29, 2010 12:20 PM PDT

Expert: Critical system flaws a 'ticking time bomb'

Combining legacy SCADA systems that have their own weaknesses with Internet technologies is a dangerous mix for protecting systems that provide energy, water and other basic needs, Black Hat presenter says.
(Posted in InSecurity Complex by Elinor Mills)
July 28, 2010 7:46 PM PDT

Sights around Black Hat 2010 (photos)

See what CNET's reporters are seeing at this year's gathering of security professionals in Las Vegas.
(Posted to CNET Download by Seth Rosenblatt)
July 28, 2010 5:27 PM PDT

Security researcher demonstrates ATM hacking

IOActive's Barnaby Jack reveals at Black Hat how he found ways to remotely log into ATMs without a password and force them to spit out cash.
(Posted in Privacy Inc. by Declan McCullagh)
July 28, 2010 5:04 PM PDT

DHS tries to defuse privacy criticism, asks for help

At Black Hat, Homeland Security's second in command receives mixed response when trying to downplay privacy concerns, asks attendees for help.
(Posted in Privacy Inc. by Declan McCullagh)
July 28, 2010 1:23 PM PDT

Adobe to follow Microsoft plan of sharing security info

The company will begin sharing vulnerability information early with security vendors just as Microsoft does. Plus: a new toolkit from Redmond.
(Posted in InSecurity Complex by Elinor Mills)
July 28, 2010 9:00 AM PDT

Check counterfeiting using botnets and money mules

SecureWorks uncovers bizarre criminal operation that uses digital techniques to aid in old-school check counterfeiting.
(Posted in InSecurity Complex by Elinor Mills)
July 28, 2010 5:00 AM PDT

App Genome Project eyes iPhone, Android security

Researchers at mobile security firm Lookout say many security issues with Android and iPhone apps result from innocent coding mistakes in third-party software.
(Posted in InSecurity Complex by Elinor Mills)
July 27, 2010 8:54 AM PDT

Hackers to flock to Black Hat, Defcon this week

Researcher to give talk on ATM security holes that was canceled a year ago, but talk on Chinese cyber army is axed after Taiwan complains.
(Posted in InSecurity Complex by Elinor Mills)
July 27, 2010 4:00 AM PDT

Google fixes Chrome holes, seeks security reform

Seven holes are fixed, six researchers who found them are paid bounties, and Google urges all software makers to fix serious problems within 60 days.
(Posted in Deep Tech by Stephen Shankland)
July 27, 2010 12:56 AM PDT

Researchers to demo rootkit on Android phone

Defcon demo to show rootkit running on an Android-based smartphone that could give an intruder full access to all the functions of the device.
(Posted in Security by Matthew Broersma)
June 2, 2010 11:35 AM PDT
 

Join the discussion

Conversation powered by Livefyre

Don't Miss
Hot Products
Trending on CNET

HOT ON CNET

Looking for an affordable tablet?

CNET rounds up high-quality tablets that won't break your wallet.