Security in focus at Black Hat
Computer security pros descend on Washington, D.C., confab to talk risks, hacks and digital self-defense.
Computer security pros descend on Washington, D.C., confab to talk risks, hacks and digital self-defense.
People sniffing wireless network traffic have many tools at their disposal to intercept sensitive data from PCs.
March 1, 2007
Technique lets intruders exploit flaws previously thought to be insignificant, says security researcher.
March 1, 2007
Mitre initiative, backed by Homeland Security, is designed to replace many variations in use today with standard flaw terms.
March 1, 2007
Memory space on components such as graphics cards, DVD drives and batteries can be used by miscreants to load malicious code onto PCs.
February 28, 2007
Government official calls for tools to help investigators sift through increasing amounts of data seized by law enforcement.
February 28, 2007
blog Is the book on the Mac Wi-Fi hijack saga finally being closed?
February 28, 2007
Legal threat from HID prompts security researchers to cancel discussion on flaws of radio tag-embedded building access ID cards.
February 27, 2007
blog Chris Paget, director of research and development with IOActive, delivered a modified version of his cancelled talk.
February 28, 2007
Your Wi-Fi can tell people a lot about you
People sniffing wireless network traffic have many tools at their disposal to intercept sensitive data from PCs.March 1, 2007
New hacker trick may expose Oracle databases
Technique lets intruders exploit flaws previously thought to be insignificant, says security researcher.March 1, 2007
Dictionary for software bugs to cut confusion?
Mitre initiative, backed by Homeland Security, is designed to replace many variations in use today with standard flaw terms. March 1, 2007
PC hardware can pose rootkit threat
Memory space on components such as graphics cards, DVD drives and batteries can be used by miscreants to load malicious code onto PCs. February 28, 2007
Cybercops drowning in data
Government official calls for tools to help investigators sift through increasing amounts of data seized by law enforcement.February 28, 2007
Mac Wi-Fi hijack demonstrated
blog Is the book on the Mac Wi-Fi hijack saga finally being closed? February 28, 2007
Nixed: Black Hat talk on RFID access badge risks
Legal threat from HID prompts security researchers to cancel discussion on flaws of radio tag-embedded building access ID cards.February 27, 2007
Redacted RFID talk delivered at Black Hat
blog Chris Paget, director of research and development with IOActive, delivered a modified version of his cancelled talk.
February 28, 2007