Black Hat

The latest news and comment from the Black Hat hacker conference.

Black Hat News

Researcher creates proof-of-concept worm for network-attached storage devices

Infecting NAS devices with malware can be very valuable for attackers, a researcher said read more »

Once the FBI has a backdoor into your smartphone, everyone does

FBI director James Comey believes tech companies should be forced to insert back doors to bypass encryption on smartphones. But experts say once that happen,s security is moot and anyone can breach your privacy. read more »

New Web vulnerability enables powerful social engineering attacks

The vulnerability allows creating links to legitimate sites that trigger malicious file downloads when clicked read more »

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said read more »

All-in-one printers can be used to control infected air-gapped systems from far away

Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner read more »

Criminals used a malware program to steal millions from ATMs

The malware is installed from a bootable CD by first gaining physical access to the ATM read more »

more news ..
Black Hat Blogs

De-fanging Software Patents For GNU GPL'd Code

read more »

Startups at BlackHat 2013 that caught the eye

What happens in Vegas should be shared.... read more »

Information security metrics insanity, the 3Rs and dashboards

It's top-line growth and bottom-line profitability that senior leaders care about, yet our metrics don't really tell senior leaders anything they want to hear read more »

Observations from Black Hat - More defence please

Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Black Hat In Depth

Kicking the stool out from under the cybercrime economy

Cripple the automated processes presented by malware platforms and the threats aren't quite so serious read more »

CISOs taking a leap of faith

Changing career focus can surprise you read more »

The ABC of the Internet of Things

There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »

Hiring managers advise job seekers to contribute to open-source projects

Joining an open-source community isn't required to land a development job, but it could help read more »

Google Bouncer beaten at Black Hat 2012

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool read more »

Black hat vs white hat - the fight for the London 2012 Olympics

At the 2012 London Olympics this summer, hackers will be out in full force read more »

more in depth ..
Black Hat Slideshows

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology read more »

10 new open source projects you may not know about

With so many open source software projects under way at any given moment, it can be difficult to keep tabs on all that's going on read more »

Best and worst celebrity technology moments of 2010

Lindsay Lohan, Lady Gaga and Stephen Colbert collide with Twitter, iPads and hackers. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open