Black Hat
1,500 severe security events detected on Black Hat WLAN
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …
Researchers beat Google’s Bouncer
When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …
Detect and shut down rogue mobile apps
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …
First holistic security platform unveiled at Black Hat
AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
CryptoAuditor: Privileged user access auditing
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …
Microsoft Security Toolkit delivers new defensive technology
Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …
Free advanced evasion technique testing software
Stonesoft released Evader, the first software-based testing tool that empowers organizations to test their network security solutions’ ability to withstand advanced …
Penetration testing tool masquerades as surge protector
In the same way that a hardware keylogger may remain undetected by office workers, Power Pwn – a newly created piece of hardware resembling a power strip or surge …
Win a free ticket to Black Hat Abu Dhabi 2011
Black Hat Abu Dhabi 2011 is scheduled to be held at the Emirates Palace in Abu Dhabi on December 14-15. Help Net Security is offering a free ticket to the Briefings part of …
A look into Black Hat’s wireless network
Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments