HackDig : Dig high-quality web security articles for hacker

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:1125 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

Getting the Most Out of Black Hat

It’s the time of year when security professionals of all stripes gather in the Las Vegas desert to attend the Black Hat, DEF CON and BSides conferences. If you’ve never been before, the anticipation is building, and next week will be like nothing you’ve ever experienced. If this is your 10th or 12th trip, then you’re probably thinkin
Publish At:2017-07-21 15:25 | Read:1252 | Comments:0 | Tags:Data Protection Black Hat Black Hat USA Education Profession

Black Hat is coming and with it a good reason to update your “Broadcom-based” devices

BroadPwn potentially expose to hack millions of Android devices using Broadcom Wi-Fi Chip, update your “Broadcom-based” devices. Black Hat 2017 is debuting in 3 days and with it a potential concern to most of us. It turns out that one of the conference presentations, entitled BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM’S
Publish At:2017-07-20 03:35 | Read:1243 | Comments:0 | Tags:Breaking News Hacking black hat Broadcom-based" devices Broa

Black Hat 2017 – Remember Our Name (and Our Booth; Our Booth is Really Cool)

We’ll be at Black Hat this year in booth #1216; come see us and make sure you sign-up for our free beta while you’re there. We’d love you to set up a meeting with our execs if you’re interested in how Bromium will work for your organization. If you Bring Your Own Malware and challenge our micro-VMs, at a minimum, you’ll get a s
Publish At:2017-07-18 04:15 | Read:1332 | Comments:0 | Tags:Company News 2017 Beta Black Hat Black Hat 2017 byom demo ev

The Pick of 2017 Cybersecurity Conferences

Cybersecurity conferences provide excellent opportunities to network with peers, learn about the latest trends in security, engage with vendors and see firsthand the latest developments in technology. Here is a roundup of some of the most interesting 2017 cybersecurity conferences. RSA Conference For many cybersecurity experts and enthusiasts, the RSA Confer
Publish At:2017-01-09 21:50 | Read:2355 | Comments:0 | Tags:CISO Security Intelligence & Analytics Black Hat BSides DEF

Black Hat 2016 Summary Part 2.1

A few months ago I had the oportunity to visit this year’s Black Hat in Las Vegas. Due to a few weeks of vacation following the conference here are my delayed 2 cents (part 1) Abusing Bleeding Edge Web Standards For AppSec Glory – Bryant Zadegan & Ryan Lester Slides Bryant and Ryan talked about new web standards which are already implemented in par
Publish At:2016-10-06 15:45 | Read:1100 | Comments:0 | Tags:Conferences Black Hat conferences

Mail’s Here! And With It a Malware-Laden USB Stick, Warns Aussie Police

Australian police is advising people to be on the lookout for unmarked, malware-laden USB sticks that someone is dropping into their mailboxes.On 21 September, the Victoria Police published a statement revealing that residents of the suburb of Pakenham in Victoria’s capital Melbourne are discovering unmarked USB drives in their mailboxes.Here’s a
Publish At:2016-09-22 01:15 | Read:1437 | Comments:0 | Tags:Latest Security News black hat Fraud malware USB vulnerabili

Survey: Only 34% of IT Pros ‘Very Confident’ They Could Recover from Ransomware

Ransomware is having quite the year. According to the FBI, crypto-malware authors extorted more than 200 million USD from users in the first three months of 2016. They’re well on their way to raking in over one billion dollars by the end of the year.Part of the reason ransomware developers are doing so well, the FBI explains in a letter, is because the
Publish At:2016-09-02 06:20 | Read:1673 | Comments:0 | Tags:Featured Articles IT Security and Data Protection black hat

The Hottest Security Technology You Didn’t See on the Black Hat Floor

Hacker summer camp is over. The vendor hall of Black Hat USA was a bazaar of solutions waiting to “solve” every information security challenge you might face. There were products and services displayed on miles of conference center floors. They offered security nirvana via an easy purchase order and one-click install.The truth is many of these vendors have i
Publish At:2016-08-11 04:05 | Read:1883 | Comments:0 | Tags:Featured Articles IT Security and Data Protection black hat

Black Hat conference updates app to address privacy and social engineering concerns

Update: 2016-07-29 11:00am PT Black Hat confirmed with Lookout an hour before we published our findings that they have taken measures to disable the social components found within the Black Hat USA 2016 conference app. This addresses the major privacy and social concerns brought to Black Hat by Lookout during the disclosure period. Users of the existing app
Publish At:2016-07-29 16:15 | Read:1172 | Comments:0 | Tags:Security Uncategorized app vulnerabilities Black Hat Black H

Tripwire at Black Hat USA 2016: Cyberwar @ the Endpoint

Returning for its 19th year in sunny Las Vegas, the Black Hat USA conference is deemed one of the most technical and relevant information security events around the globe.Every year, thousands of attendees—ranging from security executives and recruiters to law enforcement and academia—come together to discuss the latest in security risk, research and trends.
Publish At:2016-07-28 10:55 | Read:1768 | Comments:0 | Tags:Events BHUSA black hat tripwire

The Top 10 Information Security Conferences of 2016

In Part II of our 2015 Infosec Wishlist series, a number of security experts expressed their desire for the security community to renew its focus on collaboration, communication and unity in the New Year. To accomplish this goal, folks in information security will need to internalize this message and inject it into their dealings with one another. But how c
Publish At:2016-01-06 02:10 | Read:3411 | Comments:0 | Tags:Off Topic AppSec Europe black hat bsides Conferences DEF CON

Developers Are (still) From Mars, Infosec People (still) From Venus

[The post Developers Are (still) From Mars, Infosec People (still) From Venus has been first published on /dev/random] In March 2011, Brian Honan contributed to an issue of the INSECURE magazine with an article called “Management are from Mars, information security professional are from Venus“. This title comes from the John Gray’s worldwid
Publish At:2015-11-19 06:20 | Read:1217 | Comments:0 | Tags:People / Places Security Black Hat Developers Devoxx People

Attackers Embracing Steganography to Hide Communication

Encouraged by patterns carried out on a larger scale recently, researchers believe digital steganography has arrived as a legitimate method for attackers to use when it comes to obscuring communication between command and control servers.In a presentation last week at Black Hat Europe researchers with Crowdstrike and Dell SecureWorks cited a handful of campa
Publish At:2015-11-18 22:00 | Read:2060 | Comments:0 | Tags:Malware Black Hat Black Hat Europe Crowdstrike Dell SecureWo

Tor: FBI Paid CMU $1 Million to De-Anonymize Users

More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University, it said, for the purpose of de-anonymizing users of Tor hidden services.Yesterday, Tor Project director Roger Dingledine accused the prominent Pittsburgh university of accepting at least a $1 million payout from the
Publish At:2015-11-12 21:50 | Read:1213 | Comments:0 | Tags:Privacy Web Security Alexander Volynkin Black Hat Carnegie M

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud