The conferences will dig into issues ranging from mobile malware and hacking to vulnerabilities posed by linking critical infrastructure systems to the Internet and corporate networks. There are bound to be some hijinks as well.
The conferences will dig into issues ranging from mobile malware and hacking to vulnerabilities posed by linking critical infrastructure systems to the Internet and corporate networks. There are bound to be some hijinks as well.
Hackers for Charity founder Johnny Long hopes computer and security skills can break the cycle of poverty and keep Uganda from becoming another Nigeria.
(Posted in InSecurity Complex by Elinor Mills)
August 8, 2011 4:32 p.m. PT
Stanford University researcher shows how to bypass Windows' built-in encryption that Web browsers, instant messaging clients, and other programs used to store user passwords.
(Posted in Privacy Inc. by Declan McCullagh) August 8, 2011 2:52 p.m. PT
10-year-old hacker finds zero-day flaw in games
A young hacker known as CyFi details an entirely new class of vulnerability in mobile device games at DefCon 19.
(Posted in The Download Blog by Seth Rosenblatt)
August 7, 2011 4:00 a.m. PT
Developers could sneak annoying pop-up ads or phishing attacks into mobile apps via design flaw in Android, according to researchers. (Posted in InSecurity Complex by Elinor Mills)
August 6, 2011 8:01 p.m. PT
Researchers at the Black Hat security conference show how they could disrupt and snoop on home automation networks in residences and offices using devices connected to Ethernet networks that communicate via public power lines. (Posted in InSecurity Complex by Elinor Mills)
August 5, 2011 6:25 p.m. PT
Security insider discusses Vista's level of security
Finally released from a five-year non-disclosure agreement, one security researcher dishes on Vista and reveals something surprising: Microsoft got a lot right when it came to security. (Posted in The Download Blog by Seth Rosenblatt)
August 4, 2011 9:50 p.m. PT
Carnegie Mellon researcher demonstrates a new Facebook privacy threat: profile photos can be used to ID people on dating sites and on the street.
(Posted in Privacy Inc. by Declan McCullagh) August 4, 2011 7:40 p.m. PT
Malware can brick your Apple laptop's battery, according to a security researcher at Black Hat, who says it's possible for malicious software to do even more destructive things as well.
(Posted in Privacy Inc. by Declan McCullagh) August 4, 2011 1:26 p.m. PT
At Black Hat, a pair of security engineers show off prototype UAV bristling with antennas that can eavesdrop on Wi-Fi, phone, and Bluetooth signals.
(Posted in Privacy Inc. by Declan McCullagh) August 4, 2011 11:19 a.m. PT
Researcher opens "can of worms" about security weaknesses in systems running critical infrastructure environments, expert says.
(Posted in InSecurity Complex by Elinor Mills)
August 3, 2011 6:02 p.m. PT
Microsoft offers $250,000 for security defense research
Apps infected with malware grew five-fold since January, Lookout mobile threat report finds.
(Posted in InSecurity Complex by Elinor Mills)
August 2, 2011 7:53 p.m. PT
Google searches find critical infrastructure equipment that could be remotely controlled over the Internet.
(Posted in InSecurity Complex by Elinor Mills)
August 2, 2011 4:02 p.m. PT
Hacker offspring get their own DefCon as talks on critical infrastructure hacks run next door to social-engineering contests for kids.
(Posted in InSecurity Complex by Elinor Mills)
August 2, 2011 4:32 a.m. PT
Brenno de Winter says case is hindering his writing about smart-card security and other security news and restricting his travel.
(Posted in InSecurity Complex by Elinor Mills)
August 1, 2011 4:21 p.m. PT
In the trade-off between speed and security, big traders are choosing speed to maximize profits.
(Posted in InSecurity Complex by Elinor Mills)
July 27, 2011 6:45 p.m. PT
Embedded systems that rely on cellular networks and lack authentication and encryption have holes that attackers can easily exploit, researcher says.
• Remote unlock and start for cars hacked (Posted in InSecurity Complex by Elinor Mills)
July 26, 2011 6:18 p.m. PT
New findings from Accuvant security researcher Charlie Miller suggest that Apple's notebook computer batteries are susceptible to digital hackery that could cause permanent damage.
(Posted in Apple Talk by Josh Lowensohn)
July 22, 2011 5:43 p.m. PT
Get the CNET Home newsletter
Bring your home up to speed with the latest on automation, security, utilities, networking and more.