Black Hat
Researchers hack femtocells, record mobile phones’ calls, SMS traffic
Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …
Malware attacks via malicious iPhone chargers
Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …
NSS Labs unveils Threat Modeling and Threat Forecasting
NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …
Automated remediation for APTs and 0-days
ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …
Accuvant launches Threat Intelligence Briefing service
Accuvant announced at Black Hat USA 2013 the availability of its new Threat Intelligence Briefing (TIB) service. Delivered by Accuvant LABS research experts, the service gives …
Free tool identifies risks in secure shell environments
SSH Communications Security, known the world over as the inventor of the ubiquitous Secure Shell and SFTP protocols, today announced the general availability of SSH Risk …
Umbrella by OpenDNS Service blocks advanced cyber attacks
The new release of the OpenDNS Umbrella Web security platform has been enhanced with predictive detection capabilities provided by the Umbrella Security Graph. It can …
Don’t get pwned at Black Hat, DEF CON
I am not a paranoid person and most industry conferences I go to don’t generate any worries about security. You go and participate, but otherwise operate normally, …
A historical overview of the cyberattack landscape
Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …
Major vulnerabilities in office security and RFID systems
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …
Researcher sets up honeypot to counterattack, identifies attackers
I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Featured news
Resources
Don't miss
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?