HackDig : Dig high-quality web security articles for hackers

Coronavirus impacts security conferences and events: check your schedule

With coronavirus starting to take hold globally, international travel restrictions are kicking in and more workplaces are advising to work from home whenever possible. When self-isolation is a potential solution, public gatherings are increasingly looking like a terrible idea. Events are becoming a bit of a hotspot for cases, leading to inevitably bizarre sc
Publish At:2020-03-12 15:31 | Read:700 | Comments:0 | Tags:Security world black hat bsides cancellations conferences co

Researcher Unveils CrackQ, a New Password Cracking Manager

CrackQ Password Cracking Manager is an Interface for Hashcat Served by a REST API and a JavaScript Web AppHashcat is billed as the world's fastest password cracker. It uses the power of graphical processing units (GPUs) to compare guessed plaintext passwords with known password hashes at high speed -- often at hundreds of billions of guesses per second -- un
Publish At:2019-12-04 22:15 | Read:830 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Black Hat

Black Hat US 2019 / Some Talks

I’ve been at Black Hat Vegas last week and in the following I’ll shortly discuss some talks I’ve attended and which I found interesting. Gabriele Fisher & Luke Valenta: Monsters in the Middleboxes. Building Tools for Detecting HTTPS Interception This talk was about identifying if inbound HTTPS traffic reaching a server had been interce
Publish At:2019-09-19 17:15 | Read:889 | Comments:0 | Tags:Events Black Hat Conferences

Hacker conventions: Black Hat and DEF CON – Intego Mac Podcast, Episode 96

The Intego Mac Podcast episode 96 is now available!Summer is when hackers get together to present and discuss malware, vulnerabilities, and exploits. Two big hacker conventions - Black Hat and DEF CON - were held recently, and we discuss some of the Mac-related discoveries. We also look at some interesting news, including certain Macs being banned by the FCC
Publish At:2019-09-19 16:40 | Read:1076 | Comments:0 | Tags:Intego Mac Security Podcast Black Hat DEF CON Intego Mac Pod

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Earlier this year, I gave a talk at the RSA Conference about the privacy and security flaws in many of today’s connected cars. The response was nothing short of astounding. As it turns out, people get very nervous when you talk about finding and controlling their cars from a mobile phone. While I didn’t initially set out to find vulnerabilities i
Publish At:2017-07-24 17:25 | Read:3903 | Comments:0 | Tags:Application Security Industries Software & App Vulnerabiliti

Getting the Most Out of Black Hat

It’s the time of year when security professionals of all stripes gather in the Las Vegas desert to attend the Black Hat, DEF CON and BSides conferences. If you’ve never been before, the anticipation is building, and next week will be like nothing you’ve ever experienced. If this is your 10th or 12th trip, then you’re probably thinkin
Publish At:2017-07-21 15:25 | Read:3989 | Comments:0 | Tags:Data Protection Black Hat Black Hat USA Education Profession

Black Hat is coming and with it a good reason to update your “Broadcom-based” devices

BroadPwn potentially expose to hack millions of Android devices using Broadcom Wi-Fi Chip, update your “Broadcom-based” devices. Black Hat 2017 is debuting in 3 days and with it a potential concern to most of us. It turns out that one of the conference presentations, entitled BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM’S
Publish At:2017-07-20 03:35 | Read:4135 | Comments:0 | Tags:Breaking News Hacking black hat Broadcom-based" devices Broa

Black Hat 2017 – Remember Our Name (and Our Booth; Our Booth is Really Cool)

We’ll be at Black Hat this year in booth #1216; come see us and make sure you sign-up for our free beta while you’re there. We’d love you to set up a meeting with our execs if you’re interested in how Bromium will work for your organization. If you Bring Your Own Malware and challenge our micro-VMs, at a minimum, you’ll get a s
Publish At:2017-07-18 04:15 | Read:4455 | Comments:0 | Tags:Company News 2017 Beta Black Hat Black Hat 2017 byom demo ev

The Pick of 2017 Cybersecurity Conferences

Cybersecurity conferences provide excellent opportunities to network with peers, learn about the latest trends in security, engage with vendors and see firsthand the latest developments in technology. Here is a roundup of some of the most interesting 2017 cybersecurity conferences. RSA Conference For many cybersecurity experts and enthusiasts, the RSA Confer
Publish At:2017-01-09 21:50 | Read:5754 | Comments:0 | Tags:CISO Security Intelligence & Analytics Black Hat BSides DEF

Black Hat 2016 Summary Part 2.1

A few months ago I had the oportunity to visit this year’s Black Hat in Las Vegas. Due to a few weeks of vacation following the conference here are my delayed 2 cents (part 1) Abusing Bleeding Edge Web Standards For AppSec Glory – Bryant Zadegan & Ryan Lester Slides Bryant and Ryan talked about new web standards which are already implemented in par
Publish At:2016-10-06 15:45 | Read:3332 | Comments:0 | Tags:Conferences Black Hat conferences

Mail’s Here! And With It a Malware-Laden USB Stick, Warns Aussie Police

Australian police is advising people to be on the lookout for unmarked, malware-laden USB sticks that someone is dropping into their mailboxes.On 21 September, the Victoria Police published a statement revealing that residents of the suburb of Pakenham in Victoria’s capital Melbourne are discovering unmarked USB drives in their mailboxes.Here’s a
Publish At:2016-09-22 01:15 | Read:3914 | Comments:0 | Tags:Latest Security News black hat Fraud malware USB vulnerabili

Survey: Only 34% of IT Pros ‘Very Confident’ They Could Recover from Ransomware

Ransomware is having quite the year. According to the FBI, crypto-malware authors extorted more than 200 million USD from users in the first three months of 2016. They’re well on their way to raking in over one billion dollars by the end of the year.Part of the reason ransomware developers are doing so well, the FBI explains in a letter, is because the
Publish At:2016-09-02 06:20 | Read:4417 | Comments:0 | Tags:Featured Articles IT Security and Data Protection black hat

The Hottest Security Technology You Didn’t See on the Black Hat Floor

Hacker summer camp is over. The vendor hall of Black Hat USA was a bazaar of solutions waiting to “solve” every information security challenge you might face. There were products and services displayed on miles of conference center floors. They offered security nirvana via an easy purchase order and one-click install.The truth is many of these vendors have i
Publish At:2016-08-11 04:05 | Read:4135 | Comments:0 | Tags:Featured Articles IT Security and Data Protection black hat

Black Hat conference updates app to address privacy and social engineering concerns

Update: 2016-07-29 11:00am PT Black Hat confirmed with Lookout an hour before we published our findings that they have taken measures to disable the social components found within the Black Hat USA 2016 conference app. This addresses the major privacy and social concerns brought to Black Hat by Lookout during the disclosure period. Users of the existing app
Publish At:2016-07-29 16:15 | Read:3913 | Comments:0 | Tags:Security Uncategorized app vulnerabilities Black Hat Black H

Tripwire at Black Hat USA 2016: Cyberwar @ the Endpoint

Returning for its 19th year in sunny Las Vegas, the Black Hat USA conference is deemed one of the most technical and relevant information security events around the globe.Every year, thousands of attendees—ranging from security executives and recruiters to law enforcement and academia—come together to discuss the latest in security risk, research and trends.
Publish At:2016-07-28 10:55 | Read:4614 | Comments:0 | Tags:Events BHUSA black hat tripwire


Share high-quality web security related articles with you:)