Please turn on your JavaScript for this page to function normally.
Malicious advertisements surge! 260% spike in 2015

“RiskIQ announced at Black Hat USA 2015 its latest findings on the prevalence of malvertising across the nearly two billion publisher pages and 10 million mobile apps it …

Macs can be permanently compromised via firmware worm

“Security researchers Xeno Kovah and Trammell Hudson have discovered several flaws in the firmware installed on Apple computers, and have created a worm that can …

Researchers hack Linux-powered sniper rifle

When talking about the Internet of Things – “things” with an embedded computing system able to interoperate within the Internet infrastructure – we …

Test your defensive and offensive skills in the eCSI Hacker Playground

BalaBit and Silent Signal today announced that registration is now open for the eCSI Hacker Playground. The hacker challenge is a global online competition, specially designed …

Why enterprise security priorities don’t address the most serious threats

In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence …

Delivering malicious Android apps hidden in image files

Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, …

(IN)SECURE Magazine issue 43 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …

Why open source and collaboration are the future of security

In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security …

Malicious and risky apps on Android and iOS

Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …

Lessons learned from running 95 bug bounty programs

Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and …

The economics of hacking

In this podcast recorded at Black Hat USA 2014, Wade Williamson, Security Researcher at Shape Security, talks about the economics of hacking and how some of today’s …

The synergy of hackers and tools at the Black Hat Arsenal

Black Hat USA 2014 recently welcomed more than 9,000 of the most renowned security experts – from the brightest in academia to world-class researchers and leaders in the …

Don't miss

Cybersecurity news