From a mock trial in "Hacker Court" to presentations titled "Bad Sushi" and "Satan is on My Friends List," the Black Hat security conference in Las Vegas promises to be provocative.
French journalists thrown out of the security conference and permanently banned for allegedly sniffing network passwords of their fellow journalists.
(Posted in Security by Elinor Mills)
August 7, 2008 6:30 PM PDT
A CNET News reporter explains how she may or may not have gotten hacked at the Black Hat security conference.
(Posted in Security by Elinor Mills)
August 8, 2008 1:00 AM PDT
Microsoft says it wants credit when it reports security flaws to third-party vendors.
(Posted in Security by Elinor Mills)
August 7, 2008 4:30 PM PDT
(Posted in Security by Robert Vamosi)
August 7, 2008 1:13 PM PDT
The director of the National Cyber Security Center makes connections between today's online dangers and the insider threats and hacks of American history.
(Posted in Security by Elinor Mills)
August 7, 2008 11:06 AM PDT
(Posted in Security by Robert Vamosi)
August 7, 2008 9:44 AM PDT
CNET's Robert Vamosi calls in from the Black Hat hacker conference in Las Vegas. Plus, is there really a mechanism for blacklisting iPhone applications?
(Posted in Daily Podcast by Holly Jackson)
August 7, 2008 12:52 PM PDT
(Posted in Security by Robert Vamosi)
August 7, 2008 9:07 AM PDT
Kaminsky details DNS flaw
Four members of a group convened by the Center for Strategic and International Studies say the next administration must focus on industry-government collaboration.
(Posted in Politics and Law by Declan McCullagh)
August 7, 2008 5:00 AM PDT
Security expert explains how data can be stolen off electronic toll devices and how people can be tracked in real time.
(Posted in Security by Elinor Mills)
August 6, 2008 4:37 PM PDT
A talk on vulnerabilities in the encryption within Apple FileVault was never submitted, say officials with the security conference.
(Posted in Security by Robert Vamosi)
August 6, 2008 12:46 AM PDT
This year marks my ninth year of attending Black Hat in Las Vegas. From a small gathering of security professionals in 2000 to an uberconference in 2008, Black Hat has scaled well.
(Posted in Defense in Depth by Robert Vamosi)
August 5, 2008 1:58 PM PDT
Redmond readies new programs to help customers prioritize patches and to let vendors update their affected software before exploits can be written.
(Posted in Security by Elinor Mills)
August 5, 2008 6:00 AM PDT
Controversial speakers and the addition of the "wall of sheep" from Defcon should make for a hot time in Las Vegas this year.
(Posted in Security by Robert Vamosi)
August 4, 2008 10:20 PM PDT
A second Black Hat session focused on Apple security disappears from the current session schedule.
(Posted in Security by Robert Vamosi)
August 4, 2008 1:54 PM PDT
Brian Chess and Jacob West of Fortify, who will provide running commentary at conference's competition to find vulnerabilities, are this week's guests on the Security Bites podcast.
August 4, 2008 11:00 AM PDT
Apple pulled out of the Black Hat conference, which is precisely what it should not be doing as it seeks to improve its security.
(Posted in The Open Road by Matt Asay)
August 4, 2008 8:07 AM PDT
This week's podcast guests are Robert Hansen and Tom Stracener, who plan to disclose a zero-day vulnerability in Google Gadgets at Black Hat next week.
August 1, 2008 1:51 PM PDT
Researcher signed confidentiality agreements with Apple, preventing him from speaking on the topic or discussing the matter further.
(Posted in Security by Robert Vamosi)
August 1, 2008 11:17 AM PDT
In a Webinar on Thursday, researcher discloses specifics about his DNS cache poisoning flaw, and cites statistics on the number of systems that are patched.
(Posted in Security by Robert Vamosi)
July 24, 2008 2:09 PM PDT
Fellow Black Hat researcher apparently guesses the vulnerability, causing Dan Kaminsky to urge everyone to patch their systems immediately.
(Posted in Security by Robert Vamosi)
July 21, 2008 8:59 PM PDT
First broadcast previewed five presentations to be made in full in August with future Webinars perhaps once a month.
(Posted in Defense in Depth by Robert Vamosi)
June 26, 2008 1:58 PM PDT
Black Hat expels reporters in network snooping
French journalists thrown out of the security conference and permanently banned for allegedly sniffing network passwords of their fellow journalists.
(Posted in Security by Elinor Mills)
August 7, 2008 6:30 PM PDT
Targeted for hacking by reporters at my table
A CNET News reporter explains how she may or may not have gotten hacked at the Black Hat security conference.
(Posted in Security by Elinor Mills)
August 8, 2008 1:00 AM PDT
Microsoft to seek credit for finding vulnerabilities
Microsoft says it wants credit when it reports security flaws to third-party vendors.
(Posted in Security by Elinor Mills)
August 7, 2008 4:30 PM PDT
Wall of Sheep comes to Black Hat
A popular fixture at Defcon is at this year's Black Hat to show the corporate crowd how vulnerable their data is on public networks.(Posted in Security by Robert Vamosi)
August 7, 2008 1:13 PM PDT
Cybersecurity lessons from the Civil War
The director of the National Cyber Security Center makes connections between today's online dangers and the insider threats and hacks of American history.
(Posted in Security by Elinor Mills)
August 7, 2008 11:06 AM PDT
Looking inside the Storm worm botnet
Venerable botnet encrypts its command codes using the current date.(Posted in Security by Robert Vamosi)
August 7, 2008 9:44 AM PDT
Podcast: What's on hackers' minds at Black Hat?
CNET's Robert Vamosi calls in from the Black Hat hacker conference in Las Vegas. Plus, is there really a mechanism for blacklisting iPhone applications?
(Posted in Daily Podcast by Holly Jackson)
August 7, 2008 12:52 PM PDT
Researcher finally enumerates all the wonderful ways his DNS vulnerability could be exploited. And they are many.
(Posted in Security by Robert Vamosi)
August 7, 2008 9:07 AM PDT
Kaminsky details DNS flaw
'Cybersecurity commission' to proffer advice to next president
Four members of a group convened by the Center for Strategic and International Studies say the next administration must focus on industry-government collaboration.
(Posted in Politics and Law by Declan McCullagh)
August 7, 2008 5:00 AM PDT
Hacking electronic-toll systems
Security expert explains how data can be stolen off electronic toll devices and how people can be tracked in real time.(Posted in Security by Elinor Mills)
August 6, 2008 4:37 PM PDT
Black Hat: 'Canceled' Apple talk never existed
A talk on vulnerabilities in the encryption within Apple FileVault was never submitted, say officials with the security conference. (Posted in Security by Robert Vamosi)
August 6, 2008 12:46 AM PDT
Black Hat 2008: Notes from the field
This year marks my ninth year of attending Black Hat in Las Vegas. From a small gathering of security professionals in 2000 to an uberconference in 2008, Black Hat has scaled well.(Posted in Defense in Depth by Robert Vamosi)
August 5, 2008 1:58 PM PDT
Microsoft to give heads-up on vulnerabilities
Redmond readies new programs to help customers prioritize patches and to let vendors update their affected software before exploits can be written. (Posted in Security by Elinor Mills)
August 5, 2008 6:00 AM PDT
Black Hat 2008 promises to be big
Controversial speakers and the addition of the "wall of sheep" from Defcon should make for a hot time in Las Vegas this year. (Posted in Security by Robert Vamosi)
August 4, 2008 10:20 PM PDT
Apple nixes second Black Hat talk
A second Black Hat session focused on Apple security disappears from the current session schedule. (Posted in Security by Robert Vamosi)
August 4, 2008 1:54 PM PDT
Security Bites 111: Iron Chef returns to Black Hat
Brian Chess and Jacob West of Fortify, who will provide running commentary at conference's competition to find vulnerabilities, are this week's guests on the Security Bites podcast.August 4, 2008 11:00 AM PDT
Apple's security through obscurity policy at Black Hat
Apple pulled out of the Black Hat conference, which is precisely what it should not be doing as it seeks to improve its security. (Posted in The Open Road by Matt Asay)
August 4, 2008 8:07 AM PDT
previous coverage
Security Bites 110: Breaking Google Gadgets
This week's podcast guests are Robert Hansen and Tom Stracener, who plan to disclose a zero-day vulnerability in Google Gadgets at Black Hat next week. August 1, 2008 1:51 PM PDT
Black Hat talk on Apple encryption canceled
Researcher signed confidentiality agreements with Apple, preventing him from speaking on the topic or discussing the matter further. (Posted in Security by Robert Vamosi)
August 1, 2008 11:17 AM PDT
Kaminsky (finally) provides DNS flaw details
In a Webinar on Thursday, researcher discloses specifics about his DNS cache poisoning flaw, and cites statistics on the number of systems that are patched. (Posted in Security by Robert Vamosi)
July 24, 2008 2:09 PM PDT
Is Kaminsky's DNS flaw public?
Fellow Black Hat researcher apparently guesses the vulnerability, causing Dan Kaminsky to urge everyone to patch their systems immediately. (Posted in Security by Robert Vamosi)
July 21, 2008 8:59 PM PDT
Black Hat launches Webinar series
First broadcast previewed five presentations to be made in full in August with future Webinars perhaps once a month. (Posted in Defense in Depth by Robert Vamosi)
June 26, 2008 1:58 PM PDT