Black Hat

Black Hat is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers.

The conference is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various computer security vendors, in effort to keep the conference vendor-neutral.

p

Conference information

Days until the next conference

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Location

Marina Bay Sands
10 Bayfront Avenue
Singapore 018956

Conference program

The conference program can be viewed here.

News

  • 01-10-2014 | A Statement: Black Hat Asia 2015 Dates – Read more

Marina Bay Sands

Articles

T-Mobile quietly hardens part of its U.S. cellular network against snooping

22-10-2014 | Wireless carrier T-Mobile US has been quietly upgrading its network in a way that makes it harder for surveillance equipment to eavesdrop on calls and monitor texts, even on the company’s legacy system. Tests by the Post in New York, Washington, and Boulder, Colorado showed that AT&T calls used the older A5/1 encryption, making them more vulnerable to interception by law enforcement officials or criminals with access to advanced surveillance technology. The tests were performed using a custom application called Darshak which was released at the Black Hat security conference in August. Read more

Researcher creates proof-of-concept worm for network-attached storage devices

20-10-2014 | Infecting NAS devices with malware can be very valuable for attackers, a researcher said. During a presentation last week at the Black Hat Europe security conference in Amsterdam, Holcomb demonstrated a proof-of-concept worm that can automatically infect the D-LINK DNS-345, TRENDnet TN-200/TN-200T1 and Western Digital MyCloud EX4 devices by exploiting command injection and authentication bypass vulnerabilities, which as far as he knows, are still unpatched. Read more

All-in-one printers can be used to control air-gapped systems

16-10-2014 | Researchers have developed Morse code for transmitting data via pulses of light sent to an operating scanner. Shamir presented the unusual attack, which he dubbed Scangate, Thursday during his keynote at the Black Hat Europe security conference in Amsterdam. Read more

Bad news, fandroids: He who controls the IPC tool, controls the DROID

16-10-2014 | A security flaw in a core message-passing mechanism leaves every Android device potentially vulnerable to attack, security researchers warned on Thursday. Artenstein and Idan Revivo, a mobile malware researcher at Check Point, unveiled their research during a presentation at the Black Hat Europe conference in Amsterdam, the Netherlands, on Thursday. Read more

Available videos

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.

Tweets