Home Tags Hat

Tag: hat

New WikiLeaks dump: The CIA built Thunderbolt exploit, implants to target...

Enlarge / One of these things is a CIA implant dropper. (credit: From an original image by Scott Ackerman) WikiLeaks today dumped a...

Black Hat Review Board Spotlight: Beyond the Bio with Jamie...

Get to know the Black Hat Review Board in a new interview series, Beyond the Bio.In this series, Black Hat Review Board Members offer...

Black Hat Asia 2017: CISOs Must Get Proactive about the...

These four steps will help reduce the risk from looming IoT attacks

Trump’s EPA chief: “We need to continue the debate” on climate...

Enlarge / Scott Pruitt shows off a hat with the logo of the organization he now leads. (credit: Aaron P.Bernstein/Getty Images) The...

Black Hat Asia 2017: Securing Mobile Devices

Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and...

Black Hat Asia 2017: Threat & Vulnerability Management: Knowing You’re...

Threat and vulnerability management is a foundational technique that every security professional should embrace. Here's why.

Western Australia’s Web votes have security worries, say ‘white hat’ mathematicians

iVote's proxy issues certs – and decrypts data – in America The Western Australian government is pushing back against concerns about the security of...

Java garbage collector proposal aimed at performance testing

Java could be getting a garbage collector that allocates but does not reclaim memory, providing special testing benefits. A draft Java proposal recently floated named...

Don’t panic about SHA-1—fix it

Last week, Google unveiled proof that it had successfully created a collision attack against the SHA-1 hash algorithm, a security weakness long suspected to...