Black Hat is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers.
The conference is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various computer security vendors, in effort to keep the conference vendor-neutral.
Days until the next conference
22-10-2014 | Wireless carrier T-Mobile US has been quietly upgrading its network in a way that makes it harder for surveillance equipment to eavesdrop on calls and monitor texts, even on the company’s legacy system. Tests by the Post in New York, Washington, and Boulder, Colorado showed that AT&T calls used the older A5/1 encryption, making them more vulnerable to interception by law enforcement officials or criminals with access to advanced surveillance technology. The tests were performed using a custom application called Darshak which was released at the Black Hat security conference in August. Read more
20-10-2014 | Infecting NAS devices with malware can be very valuable for attackers, a researcher said. During a presentation last week at the Black Hat Europe security conference in Amsterdam, Holcomb demonstrated a proof-of-concept worm that can automatically infect the D-LINK DNS-345, TRENDnet TN-200/TN-200T1 and Western Digital MyCloud EX4 devices by exploiting command injection and authentication bypass vulnerabilities, which as far as he knows, are still unpatched. Read more
16-10-2014 | Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner. Shamir presented the unusual attack, which he dubbed Scangate, Thursday during his keynote at the Black Hat Europe security conference in Amsterdam. Read more
16-10-2014 | A security flaw in a core message-passing mechanism leaves every Android device potentially vulnerable to attack, security researchers warned on Thursday. Artenstein and Idan Revivo, a mobile malware researcher at Check Point, unveiled their research during a presentation at the Black Hat Europe conference in Amsterdam, the Netherlands, on Thursday. Read more
I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.