Researchers are sounding an alarm over the growing number of Bluetooth devices used for keyless entry and mobile point-of-sales systems that are vulnerable to man-in-the-middle attacks.
Browsing Category: Black Hat
Researchers at Check Point said the Quadrooter flaw that leaves 900 million devices open to attack will not be fixed until September.
Researchers create a self-propagating worm that can infect a Siemens’ PLC and can be programmed to bring an industrial control platform to its knees.
Gunter Ollmann, CSO at Vectra networks, talks to Mike Mimoso about ransomware as a prototype for malware going forward, as well as the long-term future of exploit kits and whether IoT is something that can be secured sooner rather than later.
Apple closed out Black Hat today with a long-awaited announcement that next month it will launch a bug bounty.
Two academics discussed just how woefully inadequate some services are encryption-wise in a talk at Black Hat on Thursday.
Google explained during a Black Hat talk its approach to patching Android vulnerabilities and lessons learned post-Stagefright.
This Black Hat demo sheds light on how quickly an attacker can gain a foothold inside a network by luring victims with malicious “lost” USB drives.
Joshua Drake of Zimperium Labs talks to Mike Mimoso about the last year post-Stagefright, the effectiveness of Google’s monthly patching cycle, and some of the security enhancements forthcoming in Android N.