Security Experts:

Black Hat
long dotted


Saturday afternoon at DerbyCon, SecurityWeek sat down with Ryan Sevey, an information security consultant for a utility company, who gave a talk on security solutions for Small and Mid Size Businesses. [Read More]
As for the risk of having a SOHO router hijacked, it’s actually rather strong. Security researchers Michael Coppola said that he discovered thousands of IP addresses owned by open routers that use default credentials. [Read More]
Chinese communications giant Huawei Technologies on Wednesday responded to US hackers' claims that its routers were easily cracked, saying its security strategies were rigorous. [Read More]
It’s Sunday evening, surrounded by sand and mountains, the glitz and glamour of Las Vegas twinkles a fond farewell to thousands of hackers as they head home from Def Con’s 20th anniversary gathering. [Read More]
At the DEF CON security conference, which wrapped this past weekend, researcher Thomas Cannon of viaForensics revealed how to brute-force attacks on Android devices. [Read More]
HTML5, the new Web standard that will make it easier to develop websites and applications that run on various screen sizes, is also vulnerable to stealth attacks and silent exploits, a security researcher said at the Black Hat security conference. [Read More]
Information security professionals can establish a better relationship with the users within the organization by improving lines of communication, a security analyst told Black Hat attendees. [Read More]
Dressed in casual attire, the nation’s top intelligence official made history by being the highest ranked government official to speak at DEF CON in its 20-year history. [Read More]
A new survey of Black Hat attendees shows many are not afraid to fight back against hackers with their own tactics. But the legalities of cyberspace can be complex – particularly when organizations consider whether offense is the best defense. [Read More]
A new survey of Black Hat attendees shows many are not afraid to fight back against hackers with their own tactics. [Read More]


rss icon

Laurence Pitt's picture
Despite the lack of travel and in-person networking opportunities, virtual events have proven valuable in learning about the industry’s top trends and engaging in important discussions with our peers. Black Hat was no exception.
Laurence Pitt's picture
Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity.
Mark Hatton's picture
At a time when many are questioning the need for continued spending on security, it’s time for us as security professionals to step up and meet these challenges and prove that it is money well spent.
Wade Williamson's picture
The idea of teaching someone how to hack almost always generates a negative visceral reaction, because the assumption is that you intend to teach someone how to become a criminal. However, an understanding of hacking no more makes a criminal than an understanding of karate makes someone use the discipline maliciously.
Robert Vamosi's picture
Drawing parallels with the SCADA industry, researcher Jay Radcliffe gave a personal account of his experience of having Type 1 diabetes and how various devices he uses control his diabetes could be manipulated by "evil doers" at this week's Black Hat Conference.
Mike Lennon's picture
Las Vegas is about to transform into Hackertown, USA. This week, thousands of hackers from across the country and around the world will assemble in Las Vegas for a series of hacker conferences, including the most anticipated and hottest conference of the year, Black Hat USA 2011.
Noa Bar-Yosef's picture
Online gambling sites face security challenges from a number of different sources. First, there’s the external hacker, who at his own convenience – from his home, a cafe or on the road – can launch attacks in attempt to steal sensitive data, raise havoc or commit fraud.
Robert Vamosi's picture
In the hours proceeding the annual Hack In The Box conference in Amsterdam, researcher Don Bailey visited Boston, Afghanistan, Libya, and at the White House. Or so his tracking device reported...
Matt Hines's picture
Why is Julian Assange getting all the ethical hacking harshing? Isn’t this Jeff Moss inviting similar rule-breaking, convention-smashing mayhem into our country, nay the world, by inviting hackers to come to these events and tell everyone how to break into important stuff?
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!