Black Hat expels reporters in network snooping
French journalists thrown out of the security conference and permanently banned for allegedly sniffing network passwords of their fellow journalists.(Posted in Security by Elinor Mills)
August 7, 2008 6:30 PM PDT
Targeted for hacking by reporters at my table
A CNET News reporter explains how she may or may not have gotten hacked at the Black Hat security conference.(Posted in Security by Elinor Mills)
August 8, 2008 1:00 AM PDT
Microsoft to seek credit for finding vulnerabilities
Microsoft says it wants credit when it reports security flaws to third-party vendors.(Posted in Security by Elinor Mills)
August 7, 2008 4:30 PM PDT
Wall of Sheep comes to Black Hat
A popular fixture at Defcon is at this year's Black Hat to show the corporate crowd how vulnerable their data is on public networks.(Posted in Security by Robert Vamosi)
August 7, 2008 1:13 PM PDT
Cybersecurity lessons from the Civil War
The director of the National Cyber Security Center makes connections between today's online dangers and the insider threats and hacks of American history.(Posted in Security by Elinor Mills)
August 7, 2008 11:06 AM PDT
Looking inside the Storm worm botnet
Venerable botnet encrypts its command codes using the current date.(Posted in Security by Robert Vamosi)
August 7, 2008 9:44 AM PDT
Podcast: What's on hackers' minds at Black Hat?
CNET's Robert Vamosi calls in from the Black Hat hacker conference in Las Vegas. Plus, is there really a mechanism for blacklisting iPhone applications?(Posted in Daily Podcast by Holly Jackson)
August 7, 2008 12:52 PM PDT
Kaminsky provides the why of attacking DNS
Researcher finally enumerates all the wonderful ways his DNS vulnerability could be exploited. And they are many.(Posted in Security by Robert Vamosi)
August 7, 2008 9:07 AM PDT
• Kaminsky details DNS flaw
'Cybersecurity commission' to proffer advice to next president
Four members of a group convened by the Center for Strategic and International Studies say the next administration must focus on industry-government collaboration.(Posted in Politics and Law by Declan McCullagh)
August 7, 2008 5:00 AM PDT
Hacking electronic-toll systems
Security expert explains how data can be stolen off electronic toll devices and how people can be tracked in real time.(Posted in Security by Elinor Mills)
August 6, 2008 4:37 PM PDT
Black Hat: 'Canceled' Apple talk never existed
A talk on vulnerabilities in the encryption within Apple FileVault was never submitted, say officials with the security conference.(Posted in Security by Robert Vamosi)
August 6, 2008 12:46 AM PDT
Black Hat 2008: Notes from the field
This year marks my ninth year of attending Black Hat in Las Vegas. From a small gathering of security professionals in 2000 to an uberconference in 2008, Black Hat has scaled well.(Posted in Defense in Depth by Robert Vamosi)
August 5, 2008 1:58 PM PDT
Microsoft to give heads-up on vulnerabilities
Redmond readies new programs to help customers prioritize patches and to let vendors update their affected software before exploits can be written.(Posted in Security by Elinor Mills)
August 5, 2008 6:00 AM PDT
Black Hat 2008 promises to be big
Controversial speakers and the addition of the "wall of sheep" from Defcon should make for a hot time in Las Vegas this year.(Posted in Security by Robert Vamosi)
August 4, 2008 10:20 PM PDT
Apple nixes second Black Hat talk
A second Black Hat session focused on Apple security disappears from the current session schedule.(Posted in Security by Robert Vamosi)
August 4, 2008 1:54 PM PDT
Security Bites 111: Iron Chef returns to Black Hat
Brian Chess and Jacob West of Fortify, who will provide running commentary at conference's competition to find vulnerabilities, are this week's guests on the Security Bites podcast.August 4, 2008 11:00 AM PDT
Apple's security through obscurity policy at Black Hat
Apple pulled out of the Black Hat conference, which is precisely what it should not be doing as it seeks to improve its security.(Posted in The Open Road by Matt Asay)
August 4, 2008 8:07 AM PDT
previous coverage
Security Bites 110: Breaking Google Gadgets
This week's podcast guests are Robert Hansen and Tom Stracener, who plan to disclose a zero-day vulnerability in Google Gadgets at Black Hat next week.August 1, 2008 1:51 PM PDT
Black Hat talk on Apple encryption canceled
Researcher signed confidentiality agreements with Apple, preventing him from speaking on the topic or discussing the matter further.(Posted in Security by Robert Vamosi)
August 1, 2008 11:17 AM PDT
Kaminsky (finally) provides DNS flaw details
In a Webinar on Thursday, researcher discloses specifics about his DNS cache poisoning flaw, and cites statistics on the number of systems that are patched.(Posted in Security by Robert Vamosi)
July 24, 2008 2:09 PM PDT
Is Kaminsky's DNS flaw public?
Fellow Black Hat researcher apparently guesses the vulnerability, causing Dan Kaminsky to urge everyone to patch their systems immediately.(Posted in Security by Robert Vamosi)
July 21, 2008 8:59 PM PDT
Black Hat launches Webinar series
First broadcast previewed five presentations to be made in full in August with future Webinars perhaps once a month.(Posted in Defense in Depth by Robert Vamosi)
June 26, 2008 1:58 PM PDT