Black Hat

The latest news and comment from the Black Hat hacker conference.

Black Hat News

Red Hat acquires FeedHenry to get mobile app chops

The deal adds better mobile capabilities to the JBoss Middleware portfolio read more »

Startup builds intrusion prevention system for home networks

Attacks against routers and IoT devices will generate consumer demand for intrusion prevention systems, the company believes read more »

Hacker coalition sets out to improve critical device security, challenges car makers

The group aims to improve cyber security of medical, automotive, home electronics, and public infrastructure systems read more »

Payment cards with chips aren't perfect, so encrypt everything, experts say

The EMV or 'chip-and-PIN' system is not without security flaws, researchers warned read more »

Nissan investigates claims its Infiniti car is 'most hackable'

Miller and Valasek hackable car report is causing a stir read more »

Some mobile POS devices still affected by critical flaws months after patch

Security researchers demonstrated that they can completely compromise such devices by using programmable smart cards read more »

more news ..
Black Hat Blogs

De-fanging Software Patents For GNU GPL'd Code

read more »

Startups at BlackHat 2013 that caught the eye

What happens in Vegas should be shared.... read more »

Information security metrics insanity, the 3Rs and dashboards

It's top-line growth and bottom-line profitability that senior leaders care about, yet our metrics don't really tell senior leaders anything they want to hear read more »

Observations from Black Hat - More defence please

Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Black Hat In Depth

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »

CISOs taking a leap of faith

Changing career focus can surprise you read more »

The ABC of the Internet of Things

There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »

Hiring managers advise job seekers to contribute to open-source projects

Joining an open-source community isn't required to land a development job, but it could help read more »

Google Bouncer beaten at Black Hat 2012

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool read more »

Black hat vs white hat - the fight for the London 2012 Olympics

At the 2012 London Olympics this summer, hackers will be out in full force read more »

more in depth ..
Black Hat Slideshows

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology read more »

10 new open source projects you may not know about

With so many open source software projects under way at any given moment, it can be difficult to keep tabs on all that's going on read more »

Best and worst celebrity technology moments of 2010

Lindsay Lohan, Lady Gaga and Stephen Colbert collide with Twitter, iPads and hackers. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open