The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
Governments and hackers may not have always seen eye-to-eye, but NSA head Keith Alexander bridged that gap by asking hackers at the Defcon conference for their help in securing the Internet. As he should: with Defcon over and another Black Hat conference now concluded , new idiot-proof hacking tools on the market; new malware that can compromise your BIOS without leaving a trace;
When Jeff Moss founded the Def Con hackers convention in 1993, he never imagined that two decades on, one of the key speakers at the annual Las Vegas event would be four-star General Keith Alexander, head of the U.S. National Security Agency.
Who says fun, sun, malware, and penetration testing don't mix? This year's Black Hat conference in Las Vegas offered information security training, hardware hacking, pool time, and more.
I still remember the first time I attended Black Hat. It was back when I was still working for Gartner, and at the time was considered a "rogue" conference that bordered on the illegal due to its occasional inclusion of former convicted hackers on the speaking agenda. Good, clean, white-collar analysts from Gartner most definitely weren't supposed to mingle with the underground, even those of us with hacker roots.
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyber space.
I'm attending the BlackHat this year, and one of the most interesting and controversial talks so far was "SexyDefense - Maximizing the home-field advantage" by Iftach Ian Amit.
Hackers can steal photos, text messages, surf the Web and even make phone calls from your smartphone simply with the wave of a hand, researchers at the annual Black Hat security conference in Las Vegas said Wednesday.
A new technology being added to smartphones running the Google Android and Linux-based MeeGo operating systems makes it trivial for hackers to electronically hijack handsets that are in close proximity, a researcher appearing at the Black Hat security conference said.
In the 15 years that computer hackers have gathered in Las Vegas for the Black Hat conference, an event where unknowns can become stars and tech heavyweights are skewered for security failures, one company has been noticeably absent: Apple.
Rival factions from the Internet security world will mix warily this week at a pair of Las Vegas conferences gathering computer security experts and software savants who make sport of hacking them.
The Pwnie Awards are intended to be the Oscars of the security community. The show has opened with the nomination of the candidates; the winners will be announced on Wednesday 25 July. Similar to Hollywood, this community also has bright stars who sometimes use dubious methods to try and improve their chances of winning a trophy
Some editors have posted their thoughts on what they think will be the hot topics of Black Hat 2012, but I'm going to respectfully disagree with them this round, and I'll walk alongside Robert Frost on his road not taken.
t was 3am when 21-year-old Sydney secretary Rhiannon Moore got the SMS from Westpac. Her debit card had been blocked after the bank saw it had been used to buy porn and air tickets to Malaysia.
In 1992, Jeff Moss (third from left in second row) invited a bunch of hacker friends to come to Las Vegas to party in the desert. Now in its 20th year, the DefCon hacker conference draws more than 7,000 hackers, security pros and undercover feds each year.
A reader of Venture Beat bemoans $300 USD in fraudulent charges placed on his credit card after the number was stolen from Austin, Texas security firm Stratfor Forecasting, Inc. The hooligans charged $300 to his account, buying hooded sweatshirts.