Researchers demonstrated how they can capture both Track 2 data and bypass chip and pin protections with a Raspberry Pi and infected pin pads at Black Hat.
Browsing Category: Black Hat
Oracle bug hunter David Litchfield scoured Oracle EBusiness Suite looking for vulnerabilities and shared what he found during a Black Hat talk.
Dan Kaminsky advocates fixing today’s internet before it breaks the same way it did in the 1990s.
A Black Hat talk this week is expected to take a deep dive into the ramifications of lingering support for export-grade cryptography and how patching levels are proceeding.
Black market machine trading has gone beyond the sale of servers and now includes PCs located on corporate networks or that contain sensitive data.
DARPA’s Cyber Grand Challenge is set to culminate Thursday with a competition at DEF CON it’s calling the CGC Final Event.
Mike Mimoso, Tom Spring, and Chris Brook preview Black Hat 2016, including Ivan Krstic’s talk on Apple/iOS security, Dan Kaminsky’s keynote, IoT, PAC malware, and more.
Researchers at Endgame are expected at Black Hat to introduce Hardware Assisted Control Flow Integrity (HA-CFI), which leverages features in the micro-architecture of Intel processors for security.
Sniffing HTTPS URLs with malicious PAC files gets easier with a new technique that exploits flaws in the Web Proxy AutoDiscovery protocol.
Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to push malicious apps to devices.