9 Technologies Security Researchers Will Break At Black Hat

, July 29, 2013 This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
  • E-mail


The idea of hacking the most basic layer of a computer's software platform is hardly new, but the industry has worked hard to develop countermeasures to bootkit attacks. Security researchers at this year's Black Hat will show there's still more work to be done. In one talk, researchers with Mitre will offer proof-of-concept attacks that remain persistent in the BIOS after reboot, as well as a tool that detects these attacks through timing side-channels.

Some researchers are also taking the opportunity offer additional tools meant to counter some of the recent bootkits that circumvent UEFI security. Researchers with ReversingLabs plan to introduce a new Rootkit Detection Framework for UEFI (RDFU) while at the same time demonstrating a proof-of-concept bootkit for Apple OSX to show RDFU's effectiveness.

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.