Photo gallery: Black Hat USA 2015 Business Hall
The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas, and the “business” part of the conference is bustling. Featured …
Global hacker competition challenges penetration testers
More than 500 players have registered for an exciting global online hacker challenge taking place this week during Black Hat USA 2015 and DEF CON.Organized by BalaBit, best …
NIST releases SHA-3 cryptographic hash standard
The National Institute of Standards and Technology (NIST) has released the final version of its “Secure Hash Algorithm-3” standard, a next-generation tool for …
Attackers use Google Drive, Dropbox to breach companies
A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …
Qualys announces free global asset inventory service
At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on …
Phishing attacks targeting businesses are escalating
Phishing attacks have increased by 38 percent overall in Q2 2015, and the growth has been spurred partly by the ever-growing number and sophisticated types of phishing attacks …
CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015
CDNetworks, the global content delivery network (CDN), will showcase Cloud Security 2.0 this week at Black Hat USA 2015, Booth IP29.Cloud Security 2.0 includes intelligent, …
WordPress 4.2.4 fixes critical vulnerabilities
It’s time to update your self-hosted versions of WordPress again.WordPress 4.2.4, released on Tuesday, fixes four bugs and several security issues: Three cross-site …
How to protect your privacy on Windows 10
So, you have decided to switch to Windows 10, but you heard that the new OS is a veritable vacuum for user data, which it sends back to Microsoft.Fear not! While most of the …
Security challenges emerging with the rise of the personal cloud
Personal cloud is growing in importance as it shapes how employees operate across their digital lives, according to Gartner. End-user computing (EUC) and digital workplace …
The state of the mobile ecosystem
At Black Hat USA 2015, Appthority released their second Q2 2015 Enterprise Mobile Threat Report, for which their researchers analyzed security and risky behaviors in three …
API security becoming a CXO level concern
Today at Black Hat USA 2015, Akana released the findings of a survey of over 250 security practitioners, including CSOs, CISOs, and security architects.Aimed at quantifying …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online