CNET también está disponible en español.

Ir a español

Don't show this again

Security

Black Hat a sure bet to be big, bold in Vegas

From a mock trial in "Hacker Court" to presentations titled "Bad Sushi" and "Satan is on My Friends List," security conference promises to be provocative.

From a mock trial in "Hacker Court" to presentations titled "Bad Sushi" and "Satan is on My Friends List," the Black Hat security conference in Las Vegas promises to be provocative.

Black Hat expels reporters in network snooping

French journalists thrown out of the security conference and permanently banned for allegedly sniffing network passwords of their fellow journalists.
(Posted in Security by Elinor Mills)
August 7, 2008 6:30 PM PDT

Targeted for hacking by reporters at my table

A CNET News reporter explains how she may or may not have gotten hacked at the Black Hat security conference.
(Posted in Security by Elinor Mills)
August 8, 2008 1:00 AM PDT

Microsoft to seek credit for finding vulnerabilities

Microsoft says it wants credit when it reports security flaws to third-party vendors.
(Posted in Security by Elinor Mills)
August 7, 2008 4:30 PM PDT

Wall of Sheep comes to Black Hat

A popular fixture at Defcon is at this year's Black Hat to show the corporate crowd how vulnerable their data is on public networks.
(Posted in Security by Robert Vamosi)
August 7, 2008 1:13 PM PDT

Cybersecurity lessons from the Civil War

The director of the National Cyber Security Center makes connections between today's online dangers and the insider threats and hacks of American history.
(Posted in Security by Elinor Mills)
August 7, 2008 11:06 AM PDT

Looking inside the Storm worm botnet

Venerable botnet encrypts its command codes using the current date.
(Posted in Security by Robert Vamosi)
August 7, 2008 9:44 AM PDT

Podcast: What's on hackers' minds at Black Hat?

CNET's Robert Vamosi calls in from the Black Hat hacker conference in Las Vegas. Plus, is there really a mechanism for blacklisting iPhone applications?
(Posted in Daily Podcast by Holly Jackson)
August 7, 2008 12:52 PM PDT

Researcher finally enumerates all the wonderful ways his DNS vulnerability could be exploited. And they are many.
(Posted in Security by Robert Vamosi)
August 7, 2008 9:07 AM PDT
• Kaminsky details DNS flaw

'Cybersecurity commission' to proffer advice to next president

Four members of a group convened by the Center for Strategic and International Studies say the next administration must focus on industry-government collaboration.
(Posted in Politics and Law by Declan McCullagh)
August 7, 2008 5:00 AM PDT

Hacking electronic-toll systems

Security expert explains how data can be stolen off electronic toll devices and how people can be tracked in real time.
(Posted in Security by Elinor Mills)
August 6, 2008 4:37 PM PDT

Black Hat: 'Canceled' Apple talk never existed

A talk on vulnerabilities in the encryption within Apple FileVault was never submitted, say officials with the security conference.
(Posted in Security by Robert Vamosi)
August 6, 2008 12:46 AM PDT

Black Hat 2008: Notes from the field

This year marks my ninth year of attending Black Hat in Las Vegas. From a small gathering of security professionals in 2000 to an uberconference in 2008, Black Hat has scaled well.
(Posted in Defense in Depth by Robert Vamosi)
August 5, 2008 1:58 PM PDT

Microsoft to give heads-up on vulnerabilities

Redmond readies new programs to help customers prioritize patches and to let vendors update their affected software before exploits can be written.
(Posted in Security by Elinor Mills)
August 5, 2008 6:00 AM PDT

Black Hat 2008 promises to be big

Controversial speakers and the addition of the "wall of sheep" from Defcon should make for a hot time in Las Vegas this year.
(Posted in Security by Robert Vamosi)
August 4, 2008 10:20 PM PDT

Apple nixes second Black Hat talk

A second Black Hat session focused on Apple security disappears from the current session schedule.
(Posted in Security by Robert Vamosi)
August 4, 2008 1:54 PM PDT

Security Bites 111: Iron Chef returns to Black Hat

Brian Chess and Jacob West of Fortify, who will provide running commentary at conference's competition to find vulnerabilities, are this week's guests on the Security Bites podcast.
August 4, 2008 11:00 AM PDT

Apple's security through obscurity policy at Black Hat

Apple pulled out of the Black Hat conference, which is precisely what it should not be doing as it seeks to improve its security.
(Posted in The Open Road by Matt Asay)
August 4, 2008 8:07 AM PDT

previous coverage

Security Bites 110: Breaking Google Gadgets

This week's podcast guests are Robert Hansen and Tom Stracener, who plan to disclose a zero-day vulnerability in Google Gadgets at Black Hat next week.
August 1, 2008 1:51 PM PDT

Black Hat talk on Apple encryption canceled

Researcher signed confidentiality agreements with Apple, preventing him from speaking on the topic or discussing the matter further.
(Posted in Security by Robert Vamosi)
August 1, 2008 11:17 AM PDT

Kaminsky (finally) provides DNS flaw details

In a Webinar on Thursday, researcher discloses specifics about his DNS cache poisoning flaw, and cites statistics on the number of systems that are patched.
(Posted in Security by Robert Vamosi)
July 24, 2008 2:09 PM PDT

Is Kaminsky's DNS flaw public?

Fellow Black Hat researcher apparently guesses the vulnerability, causing Dan Kaminsky to urge everyone to patch their systems immediately.
(Posted in Security by Robert Vamosi)
July 21, 2008 8:59 PM PDT

Black Hat launches Webinar series

First broadcast previewed five presentations to be made in full in August with future Webinars perhaps once a month.
(Posted in Defense in Depth by Robert Vamosi)
June 26, 2008 1:58 PM PDT