X

Black Hat: Privacy risk in e-Passports

special coverage RFID-based cards are easy to clone, researchers say. See the video here.

Hackers and security experts head for Las Vegas once again for the Black Hat Briefings, to probe tech security and see what shakes out. This year should see a departure from the usual bug hunting and break-ins: Microsoft has reserved a slot to outline the defenses, rather than the weaknesses, in Vista's code. The event is followed by Defcon, the annual hacker gathering also taking place in Vegas.

Vista breached at Black Hat

podcast Joris Evers and Robert Vamosi for highlights from the annual Black Hat and Defcon security events in Las Vegas.
August 7, 2006

New passports and ID cards with RFID are surprisingly easy to clone, researchers at Black Hat and Defcon said.
August 5, 2006

Defcon gets off to a late start

blog Defcon, the annual hacker gathering in Las Vegas, got off to a late start on Friday thanks to the Las Vegas Fire Department.
August 4, 2006

Researcher bypasses a security mechanism designed to prevent some driver software from running in the Windows update.
August 4, 2006

Multifunction printers are not dumb devices, but are computers that require a security regimen, a demo at Black Hat contends.
August 4, 2006

XP weaknesses worry Black Hatters, report says

blog Symantec surveys confab attendees on which OS concerns them most when it comes to potential vulnerabilities.
August 4, 2006

Popular RSS and Atom feeds could carry malicious JavaScript code that could compromise a PC, an expert warns.
August 4, 2006

Talks go down well with hackers looking to find out just what the company's doing to make Vista its most secure operating system ever.
August 3, 2006

The rise of rootware

blog Researchers laid out a beginner's course on rootkits to kick off a day of programming around that topic, writes CNET Reviews' Robert Vamosi.
August 3, 2006

Wi-Fi demo bruises Apple security

blogma The use of a MacBook in the break-in demo draws the attention of the blogosphere.
August 3, 2006

Programs are meant to improve security, but attackers can also use them to disconnect calls, reassign extensions or flood systems with bogus calls.
August 2, 2006

Flaws in software that runs wireless-networking hardware could let attackers take over PCs, including Macs, researchers at Black Hat warn.
August 2, 2006

A Cisco zero-day at Black Hat?

blog Company is quietly investigating a possible flaw that was mentioned during a talk on VoIP.
August 2, 2006

Criminals using Web apps to hide attacks

blog CNET Reviews' Robert Vamosi describes recent case studies where criminals used Web applications to break into companies.
August 2, 2006

Don't call it in

blog CNET Reviews' Robert Vamosi on vishing--yet another way that phishers are trying to get you to give up your personal information.
August 2, 2006

At the annual Black Hat security confab, an FBI official says the agency needs help from the security world to fight cybercrime.
August 2, 2006

Keyboard profiling at Black Hat

blog A keyboard analyst claims to be able to tell gender, handedness, and even whether you are a musician from typing, says CNET Reviews' Robert Vamosi.
August 2, 2006

The annual event usually focuses on breaking into systems. This year, a series of Microsoft-themed sessions takes a different tack.
August 1, 2006

What's coming from Las Vegas

podcast In this CNET News.com podcast, reporter Joris Evers talks about what may come out of Black Hat and Defcon.
July 31, 2006


Previous coverage

Security has become a no-brainer for desktop software, but the same doesn't hold true for the booming world of Web applications.
July 28, 2006

Sen. Tom Coburn says government still isn't ready to handle a "cyber Katrina," calls for immediate change.
July 28, 2006

Microsoft has quietly held meetings with top antivirus researchers for almost 10 years, but there's some unease now that Redmond is a rival.
July 24, 2006

Video

E-passport flaws
E-passport flaws
Researchers warn of potentially serious risks
August 8, 2006

Breaking into a MacBook
Breaking into a MacBook
Flawed Wi-Fi drivers can expose PCs
August 2, 2006


Photos


Drive-by hacks from a suitcase
Hacking at Defcon
Scenes from the show.
August 8, 2006

Drive-by hacks from a suitcase
Prying open an e-Passport
Hacker at DefCon shows how.
August 6, 2006

Drive-by hacks from a suitcase
Drive-by hacks from a suitcase
Scans for Bluetooth devices, then attacks them.
August 3, 2006

Wi-Fi hackers at Black Hat
Wi-Fi hackers at Black Hat
Guys behind the MacBook break-in.
August 3, 2006

Photos: FBI talks to hackers
FBI talks to hackers
Calls for help at Black Hat confab.
August 2, 2006


Related News


July 28, 2006


July 27, 2006


July 29, 2005


Credits

Design: Mitjahm Simmons
Production: Kendra Dodds


]]>