black hat

black hat

How to combat online advertising fraud

Apple to talk iOS security at Black Hat confab

news.cnet.com
Apple is hosting a talk at this week's Black Hat conference to discuss iOS security. It's the company's first appearance there. [Read more]...
Apple to talk iOS security at Black Hat confab

Black Hat panel: Which do you trust less with your data, the U.S. government or Google?

www.computerworld.com
To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the U.S. government, cyberwar and Google....
Black Hat panel: Which do you trust less with your data, the U.S. government or Google?

The Frightening Things You Hear at a Black Hat Conference

bits.blogs.nytimes.com
Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas this week....
The Frightening Things You Hear at a Black Hat Conference

Safer Internet Encryption via TLS May Take Years, Expert Says

www.pcworld.com
Although the Transport Layer Security (TLS) 1.2 protocol, designed to make network connections more secure, was defined in 2008, a security expert at Black Hat......
Safer Internet Encryption via TLS May Take Years, Expert Says
The iPhone charger that could hack your phone

Don't like what you see when you Google yourself? Sending a fake court order won't help

thenextweb.com
Google has started to receive falsified court orders attempting to make it remove content from its services, the company revealed while releasing its latest Transparency Report earlier today. If you think this is a clever black hat trick to get Google to remove a page you dislike, think again. “We...
Don't like what you see when you Google yourself? Sending a fake court order won't help
Developer says Twitter should shut him down. He may be about to get his wish

Black Hat Panel: Which Do You Trust Less With Your Data, the U.S. Government or Google?

www.pcworld.com
A panel of experts here at the Black Hat Conference ask: Which do you trust less with your data, the U.S. Government or Google?...
Black Hat Panel: Which Do You Trust Less With Your Data, the U.S. Government or Google?

New tool gives 150 ways to bypass web app firewalls

www.computerworld.com
A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday....
New tool gives 150 ways to bypass web app firewalls
NFC mobile payment growth could be stunted by security flaws
How I became a password cracker

Quit Photoshopping Officials Into Porn, Begs Giant Billboard

betabeat.com
(Photo: France24) China’s Hunan Province has a problem: renegades are using their skills for black hat trickery, Photoshopping pictures of Chinese government officials and company bosses into porn. They’ll then use the Photoshopped pictures to attempt to blackmail the officials, who have no way of proving it’s not actually them...
Quit Photoshopping Officials Into Porn, Begs Giant Billboard

Hotel Lock Company Wants Hotels To Pay For Fixing Their Hackable Product

www.techdirt.com
Picture yourself on vacation. You leave your hotel room, listening to the fully-licensed music in the lobby on your way out. You make sure not to ask the hotel staff for anything as you leave, lest something called a PARFF come after you. And as you're out frolicking on the...
Hotel Lock Company Wants Hotels To Pay For Fixing Their Hackable Product

Put your black hat on: http://goo.gl/oHur Google releases a microblogging app full of security holes.. on purpose! ;)

googleonlinesecurity.blogspot.com
Put your black hat on: http://goo.gl/oHur Google releases a microblogging app full of security holes.. on purpose! ;)

Can evil data scientists fool us all with the world's best spam?

gigaom.com
While most of the concern over web security has to do with criminal activity such as cyberterrorism, state secrets and hacktivism, there’s a far more annoying threat lurking beneath the surface. It’s a new generation of spam that does away with brute force email barrages in favor of fake online...
Can evil data scientists fool us all with the world's best spam?

Google's new search algorithm to crack down on "black hat webspam"

arstechnica.com
Nefarious search engine optimizers be warned. Google is coming for you-again. Following previous changes to Google's ranking and page layout algorithms, the search giant is pushing yet another update to its algorithm this week with the hopes of curbing "black hat webspam" from creeping into search results. The change...
Google's new search algorithm to crack down on "black hat webspam"
Insecure hotel keycard locks to be replaced by manufacturer
Windows 8 is shaping up to be the most secure desktop and mobile OS

Qwer.org Goes Down Hard. Both Remaining Users Pissed.

fury.com
Yesterday I shut down the 9 year old url shortening service qwer.org. I pointed all traffic from qwer.org to a penguin flash game with a banner ad at the bottom. Scandal! Uproar! Mea Culpa! The kind of scandal that lead a social media pundit to email me this morning asking...
Qwer.org Goes Down Hard. Both Remaining Users Pissed.
Hackers and flash mobs in $45m heist
GPS vulnerability could allow hackers to track, take over smartphones

Apple security guru lays out iPad, iPhone crypto architecture at Black Hat

www.computerworld.com
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted....
Apple security guru lays out iPad, iPhone crypto architecture at Black Hat

Flame's Windows Update Hack Wins Pwnie Award for Epic Ownage at Black Hat

www.pcworld.com
The judging panel of the Pwnie Awards, which are handed out every year at the Black Hat security conference for achievements and failures in IT security, have......
Flame's Windows Update Hack Wins Pwnie Award for Epic Ownage at Black Hat

Help Ars round out our 2012-2013 Tech Conference dance card

arstechnica.com
We're deep into planning our coverage for the next 18 months of technology events, conferences, confabs, and demos. While we have our own ideas, we would love for you to help us round out our list by telling us which technology conferences and events you would like to see...
Help Ars round out our 2012-2013 Tech Conference dance card

Malicious Charger Could Give Your iPhone An Electronically Transmitted Infection

betabeat.com
Photo: Wikipedia Everybody knows you shouldn’t get into a car with a stranger. And if hackers can find a way to mimic the work of three Georgia Institute of Technology researchers, you may want to reconsider using a stranger’s iPhone charger, too. To test iOS security, Billy Lau, Yeongjin Jang...
Malicious Charger Could Give Your iPhone An Electronically Transmitted Infection

Marketing Biz: Google Penguin Update, Microsoft Patent Trade & Automattic Grows Up

marketingland.com
This week search took center stage as Google implemented the Penguin Update targeting black-hat SEO. Meanwhile Facebook was busy buying those AOL patents from Microsoft but declined to purchase Bing. (No we would not like fries with that.) We also got insight into Android and Automattic, while... Please visit Marketing...
Marketing Biz: Google Penguin Update, Microsoft Patent Trade & Automattic Grows Up

Boot up: Kindle Fire hype?, iPhone 5 blueprints, Hillsborough and tech, and more

www.guardian.co.uk
Plus 0xCharlie joins Twitter, voice control for ultrabooks, ITC clears Apple of Samsung charge, how to save NFC and moreA quick burst of 9 links for you to chew over, as picked by the Technology teamHacking legend Charlie Miller signs on with Twitter >> V3.co.ukLegendary hacker and security reacher Charlie...
Boot up: Kindle Fire hype?, iPhone 5 blueprints, Hillsborough and tech, and more
Apple talks about securing iOS devices in rare Black Hat appearance

Tool Released at Black Hat Contains 150 Ways to Bypass Web Application Firewalls

www.pcworld.com
A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010......
Tool Released at Black Hat Contains 150 Ways to Bypass Web Application Firewalls
× Just a test of the new info bar. What do you think?