The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
Black Hat 2015 is underway, and the corporate side of hacking has taken center stage. There are plenty of hot topics this year, but the mess at the OPM is something that is still generating buzz months after the fact.
Vulnerabilities found in CompuSafe Galileo safes, smart safes made by the ever-reliable Brinks company that are used by retailers, restaurants, and convenience stores, would allow a rogue employee or anyone else with physical access to them to command their doors to open and relinquish their cash, according to Daniel Petro and Oscar Salazar, researchers with the security firm Bishop Fox, who plan to demonstrate their findings next week at the Def Con hacker conference in Las Vegas.
Software gets much of the hacking spotlight, perhaps understandably so. But the physical infrastructure that runs all that code is just as susceptible to messing with, though it takes a different set of knowledge and techniques. Today's Training trio touch on the more solid side of that divide.
The chief executive of Hacking Team has finally spoken out about the cyberattack which allowed sensitive corporate data, exploits and customer history to enter the public domain.
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
Dennis Fisher talks with Dan Kaminsky about the VENOM bug, the value of virtual machine escapes, why everyone wants to make every bug the worst one of all time or just a bunch of hype and what the Avengers have to do with vulnerability disclosure.
Security's heavy reliance and emphasis on technology--due to both its heritage and the reality of a shortage of manpower--is part of the reason attackers are getting the upper hand, experts said here this week.
Monday here at the show, as I've written before, is quiet. As far as RSAC is concerned, the only people here really are the vendors and their staff, a few press and analyst types, conference organizers, and the workers putting the expo hall together.
The irony was not lost on Johnny Long. On the silver screen, both hackers and zombies are typically associated with disaster, so the fact that he was at a zombie-themed security conference to speak about hackers making a positive difference in the world seemed satirical.
One of the biggest hacking conferences in the world, Def Con, took place earlier this month.
Cybersecurity talks included hacking cars, traffic lights and social engineering - where actors tried to get real companies to reveal compromising information.
The hacker who has presided for 22 years over what is today the biggest hacker conference in the United States talks to TIME about Edward Snowden, Dorian Gray and hackers' changing role in society.
It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.
Some of the more eccentric members of the security industry show up for Black Hat each year, making it tough to stand out in the enormous crowd that flocks to Las Vegas for the A-list conference. But each year vendors manage to come up with gimmicks and gizmos that attract the throngs to their booths to hear a spiel or give up their contact information so they can receive sales calls when they get home. Here are some noteworthy examples from Black Hat 2014.
Charlie Miller and Chris Valasek have proven to be adept backseat drivers.
Noted for their car-hacking exploits, Miller and Valasek have gained fame at hacking conferences and on Fox News for forcing automobiles to do their bidding.
"The situation we're in with advertising is a lot like where the banks are, where everyone has struggled with the fact that you can't trust the other end of the connection," says White Ops CEO Michael Tiffany. "It's the same cookies, user information, etc. But one is real, and the other is fake."