/* Hackers and security experts head for Las Vegas once again for the Black Hat Briefings, to probe tech security and see what shakes out. This year should see a departure from the usual bug hunting and break-ins: Microsoft has reserved a slot to outline the defenses, rather than the weaknesses, in Vista's code. The event is followed by Defcon, the annual hacker gathering also taking place in Vegas. Vista breached at Black Hat podcast Joris Evers and Robert Vamosi for highlights from the annual Black Hat and Defcon security events in Las Vegas. August 7, 2006 New passports and ID cards with RFID are surprisingly easy to clone, researchers at Black Hat and Defcon said. August 5, 2006 Defcon gets off to a late start blog Defcon, the annual hacker gathering in Las Vegas, got off to a late start on Friday thanks to the Las Vegas Fire Department. August 4, 2006 Researcher bypasses a security mechanism designed to prevent some driver software from running in the Windows update. August 4, 2006 Multifunction printers are not dumb devices, but are computers that require a security regimen, a demo at Black Hat contends. August 4, 2006 XP weaknesses worry Black Hatters, report says blog Symantec surveys confab attendees on which OS concerns them most when it comes to potential vulnerabilities. August 4, 2006 Popular RSS and Atom feeds could carry malicious JavaScript code that could compromise a PC, an expert warns. August 4, 2006 Talks go down well with hackers looking to find out just what the company's doing to make Vista its most secure operating system ever. August 3, 2006 The rise of rootware blog Researchers laid out a beginner's course on rootkits to kick off a day of programming around that topic, writes CNET Reviews' Robert Vamosi. August 3, 2006 Wi-Fi demo bruises Apple security blogma The use of a MacBook in the break-in demo draws the attention of the blogosphere. August 3, 2006 Programs are meant to improve security, but attackers can also use them to disconnect calls, reassign extensions or flood systems with bogus calls. August 2, 2006 Flaws in software that runs wireless-networking hardware could let attackers take over PCs, including Macs, researchers at Black Hat warn. August 2, 2006 A Cisco zero-day at Black Hat? blog Company is quietly investigating a possible flaw that was mentioned during a talk on VoIP. August 2, 2006 Criminals using Web apps to hide attacks blog CNET Reviews' Robert Vamosi describes recent case studies where criminals used Web applications to break into companies. August 2, 2006 Don't call it in blog CNET Reviews' Robert Vamosi on vishing--yet another way that phishers are trying to get you to give up your personal information. August 2, 2006 At the annual Black Hat security confab, an FBI official says the agency needs help from the security world to fight cybercrime. August 2, 2006 Keyboard profiling at Black Hat blog A keyboard analyst claims to be able to tell gender, handedness, and even whether you are a musician from typing, says CNET Reviews' Robert Vamosi. August 2, 2006 The annual event usually focuses on breaking into systems. This year, a series of Microsoft-themed sessions takes a different tack. August 1, 2006 What's coming from Las Vegas podcast In this CNET News.com podcast, reporter Joris Evers talks about what may come out of Black Hat and Defcon. July 31, 2006 Previous coverage Security has become a no-brainer for desktop software, but the same doesn't hold true for the booming world of Web applications. July 28, 2006 Sen. Tom Coburn says government still isn't ready to handle a "cyber Katrina," calls for immediate change. July 28, 2006 Microsoft has quietly held meetings with top antivirus researchers for almost 10 years, but there's some unease now that Redmond is a rival. July 24, 2006 Video E-passport flawsResearchers warn of potentially serious risksAugust 8, 2006 Breaking into a MacBookFlawed Wi-Fi drivers can expose PCsAugust 2, 2006 Photos Hacking at Defcon Scenes from the show. August 8, 2006 Prying open an e-Passport Hacker at DefCon shows how. August 6, 2006 Drive-by hacks from a suitcase Scans for Bluetooth devices, then attacks them. August 3, 2006 Wi-Fi hackers at Black Hat Guys behind the MacBook break-in. August 3, 2006 FBI talks to hackers Calls for help at Black Hat confab. August 2, 2006 Related News July 28, 2006 July 27, 2006 July 29, 2005 Credits Design: Mitjahm Simmons Production: Kendra Dodds