security conference

security conference

Cyber Security: Why we're scared and why we should be optimistic

Siemens software targeted by Stuxnet still full of holes

www.computerworld.com
Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities, according to Russian researchers whose presentation at the Defcon security conference earlier this year was cancelled following a request from the company....
Siemens software targeted by Stuxnet still full of holes

Android, iPhone 4S Hacked at Security Conference

betabeat.com
Get off the phone, CEO guy. (flickr.com/perspective) Attendees at the EuSecWest-sponsored World Security Professional Summit in Amsterdam are participating in a contest called Mobile Pwn2Own. Contestants are, yes, basically revealing that our mobile devices can be easily pwned by someone with the know-how. Quell your bubbling phone fanboy or fangirl...
Android, iPhone 4S Hacked at Security Conference

Your iPhone can be hacked with a malicious charger

bgr.com
You may want to think twice before using someone else's charger next time your iPhone's battery life is running low. Three researchers at the Georgia Institute of Technology claim to have invented a charger that can install malware on an iPhone, iPad or iPod touch. The team will show off...
Your iPhone can be hacked with a malicious charger

Researcher: Security appliances are riddled with serious vulnerabilities

www.pcworld.com
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendors. Most security appliances are poorly maintained Linux systems with insecure Web applications installed on them,...
Researcher: Security appliances are riddled with serious vulnerabilities

Black Hat Hackers Highlights: Awards, Attacks, and Apple

www.pcworld.com
Hotel locks, iris scans, GooglePlay and other "secure" technologies are cracked in demonstrations at the security conference....
Black Hat Hackers Highlights: Awards, Attacks, and Apple

Card Game Turns You Into a White Hat Hacker

www.pcworld.com
Black Hat security conference: University of Washington creation gives you vicarious thrills of social engineering, lock picking....
Card Game Turns You Into a White Hat Hacker

Possible flaw in Samsung's TouchWiz UI leaves smartphones open to data-wiping, SIM locks and more

thenextweb.com
A bug in the way Samsung’s TouchWiz UI interacts with USSD codes on Android smartphones may allow an attacker to perform a factory reset on susceptible devices, simply by embedding a link on a website or sending an SMS. The flaw was discovered by Ravi Borgaonkar and was shown off at the Ekoparty security conference, which...
Possible flaw in Samsung's TouchWiz UI leaves smartphones open to data-wiping, SIM locks and more
The iPhone charger that could hack your phone

Google is giving away a million bucks to those who can successfully hack Chrome

thenextweb.com
Making sure that you have the most secure browser on the web means that you need a whole lot of people doing continual security audits and QA. While Google surely has this experience and capability in-house, the company like to challenge outsiders to find holes in its Chrome browser, and...
Google is giving away a million bucks to those who can successfully hack Chrome

Weekly Poll: What is the Top Threat to Cloud Computing?

www.readwriteweb.com
The first peek at Apple's new data center stoked much of the interest in our poll last week. We asked: "Why is Apple building a massive, $1 billion data center?" A total of 1,456 people responded. This week is the RSA Conference, the largest security conference in the world. A...
Weekly Poll: What is the Top Threat to Cloud Computing?

Two Pirate Bay founders are MIA at Hack in the Box conference

www.techhive.com
Get your conspiracy theories ready: Two founders of The Pirate Bay were due to speak at the Hack in the Box security conference in Kuala Lumpur on Wednesday, but didn't show up. The 3 p.m. speaking slot for Peter "brokep" Sunde and Fredrik "tiamo" Neij was canceled. Their talk...
Two Pirate Bay founders are MIA at Hack in the Box conference
How four Microsoft engineers proved copy protection would fail

Hotel room break-ins blamed on hacked locks

www.pcworld.com
A string of break-ins at a Houston hotel are being blamed on hackers who exploited a flaw in room locks, a vulnerability that was exposed this year at the Black Hat Security Conference in Las Vegas. The Hyatt House Galleria in Houston determined that locks made by Onity had...
Hotel room break-ins blamed on hacked locks

Hotel Lock Company Wants Hotels To Pay For Fixing Their Hackable Product

www.techdirt.com
Picture yourself on vacation. You leave your hotel room, listening to the fully-licensed music in the lobby on your way out. You make sure not to ask the hotel staff for anything as you leave, lest something called a PARFF come after you. And as you're out frolicking on the...
Hotel Lock Company Wants Hotels To Pay For Fixing Their Hackable Product
Google Chrome the first browser hacked at Pwn2Own 2012

IBM hands out virus-infected USB sticks to security conference attendees

www.boygeniusreport.com
See also: This article’s headline. [Via Giz] Read...
IBM hands out virus-infected USB sticks to security conference attendees

A Guide to Spying on Cisco Phone Calls

bits.blogs.nytimes.com
At a security conference in Puerto Rico this week, a security researcher demonstrated how to spy on calls made with Cisco's VoIP phone. Yes, the same phone the president uses on Air Force One....
A Guide to Spying on Cisco Phone Calls
SEC staffers leave their computers unencrypted, take them to Black Hat hacker conference

Apple's iPhone commandeered at hacker contest days before new release

arstechnica.com
Just days before Apple was set to release the highly anticipated iPhone 5, security researchers demonstrated a hack they said allowed them to pilfer the address book, photos, videos, and browsing history from the iPhone 4S. The exploit—disclosed at a hacker contest that also successfully hijacked a Samsung Galaxy S3...
Apple's iPhone commandeered at hacker contest days before new release

Apple to Present at Black Hat Security Conference for First Time

www.macrumors.com
Bloomberg reports that Apple is taking an interesting step into security research publicity, agreeing to present at this week's Black Hat conference in Las Vegas for the first time in the conference's 15-year history.While many major technology vendors have overcome their reluctance to making a public showing at the conference,...
Apple to Present at Black Hat Security Conference for First Time

Bug Hunter Hacks Chrome at CanSecWest; Earns Top Reward From Google

www.pcworld.com
During Google's Pwnium contest at the CanSecWest security conference in Vancouver on Wednesday, Russian bug hunter Sergey Glazunov demonstrated a Chrome exploit......
Bug Hunter Hacks Chrome at CanSecWest; Earns Top Reward From Google
Censorship at a Hacker Conference? Violet Blue Cancels Her Sex Ed Talk at B-Sides

Researchers uncover hole in Call of Duty: Modern Warfare 3

www.techhive.com
Researchers have found a serious vulnerability in the game Call of Duty: Modern Warfare 3, and another in the CryEngine 3 graphics platform on which many games run. Luigi Auriemma and Donato Ferrante of security consultancy ReVuln presented their findings at the Power of Community (POC2012) security conference in...
Researchers uncover hole in Call of Duty: Modern Warfare 3

First Chrome exploit submitted in Pwnium 2 hackathon, could be worth $60k

thenextweb.com
Participants of a hackathon at the Hack In The Box security conference in Kuala Lumpur, Malaysia, have managed a successful exploit Google’s Chrome browser, though it is awaiting confirmation. Hacker “Pinkie Pie” again achieved a Full Chrome Exploit, which could be worth another $60,000 cash prize. In March, Sergey Glazunov and Pinkie...
First Chrome exploit submitted in Pwnium 2 hackathon, could be worth $60k

Google contributes $2 million prize fund to Pwnium contest

www.electronista.com
Google is putting $2 million up for grabs if hackers can exploit the Chrome web browser. The Pwnium 2 contest, to be held on October 10 at the 10th anniversary Hack In The Box security conference in Kuala Lumpur, Malaysia, following two successful hacks being demonstrated at the CanSecWest conference...
Google contributes $2 million prize fund to Pwnium contest

Samsung's Galaxy 3 is Vulnerable to Remote Wiping by Hackers [VIDEO]

betabeat.com
Ravi Borgaonkar demonstrating Galaxy handset flaws. (Screengrab) During a recent security conference in South America, a Berlin-based researcher revealed  that Samsung has a major problem with its iPhone-challenging Galaxy 3 and Galaxy S2 smartphones. Both can easily be remotely wiped by code embedded in a web page. Ravi Borgaonkar found that...
Samsung's Galaxy 3 is Vulnerable to Remote Wiping by Hackers [VIDEO]

Chrome succumbs to Pwn2Own contest hack

www.computerworld.com
Google's Chrome fell to researchers' exploits Wednesday in both hacking challenges running this week at the CanSecWest security conference....
Chrome succumbs to Pwn2Own contest hack

One line of HTML can wipe or reset Samsung smartphones

gigaom.com
Be careful what links you click: A single line of HTML code can wipe the data on certain Samsung smartphones running Google’s Android software. The issue is specific to Samsung phones that also use the company’s TouchWiz software, says SlashGear, which actually means most of the current Samsung smartphones. Google’s...
One line of HTML can wipe or reset Samsung smartphones

Let’s get judgey: Here’s our lightning round on the week’s top stories

venturebeat.com
It’s time for a sudden-death-style lightning round on the week’s news. Day in and day out, we write fairly neutral coverage of these hot-button topics, but we’re real people, man, with feelings. And sometimes, we just gotta let our freak flag fly. So this week, we present to you...
Let’s get judgey: Here’s our lightning round on the week’s top stories
× Just a test of the new info bar. What do you think?