21 Results for

blackhat

Video

Ep. 86: DefCon and BlackHat show us that everything can be hacked

We talk with our reporters covering the twin security conferences in Las Vegas this week about the massive Shady RAT hack, and research reports on hacking everything from nuclear plants to laptop batteries to insulin pumps.

By August 5, 2011

Article

Surveillance scandal rips through hacker community

The good ol' days of chummy games of "Spot the Fed" at Defcon are finished as hackers and security entrepreneurs plan next steps in the wake of government spying revelations.

By August 6, 2013

Article

Rocket scientist tells hackers to take big risks

Brian Muirhead of NASA's Jet Propulsion Lab tells security professionals at Black Hat that failure is not an option when taking big risks, but offers tips on avoiding it.

By August 2, 2013

Article

Tortilla tool makes anonymizer Tor more digestible

Tor's famous for anonymizing your Internet activities and infamous for being a pain to use. Debuting at Black Hat, the Tortilla tool smooths out some of the global network's rough edges.

By July 31, 2013

Article

Hackers to NSA chief: Read the Constitution

The head of the NSA faces a tough audience as he appeals to hackers and security professionals at Black Hat 2013 to help the U.S. government build better spying tools.

By July 31, 2013

Article

ATM hacker Barnaby Jack dies

The security researcher, who was expected to demonstrate newly-discovered pacemaker vulnerabilities at Black Hat next week, made headlines in 2010 when he hacked an ATM in front of an audience.

By July 26, 2013

Article

Microsoft to fix IE8 cross-site scripting problem, again

Microsoft to issue third fix for XSS filter in IE8 that can be exploited to launch cross-site scripting attacks on Web sites.

By April 20, 2010

Article

Microsoft offers $250,000 for security defense research

Redmond still says no to bug bounties, but offers a $200,000 first prize and $50,000 second prize instead for research in security defense.

By August 3, 2011

Article

Cybercriminals use fake search engines to spread malware

Security researchers say fake search engines are showing up in Google search results and lead to Web sites hosting malware.

By May 6, 2009

Article

Reporters' Roundtable: Everything can be hacked

We talk with our reporters covering the twin security conferences DefCon and BlackHat in Las Vegas this week about the massive Shady RAT hack and research reports on hacking everything from nuclear plants to laptop batteries to insulin pumps.

By August 5, 2011