Results tagged "Black Hat"
Total Search Results : 15
Security Conferences: Advice From The Trenches
July 30, 2013 11:52 AM
IT security conferences can offer enriching experiences, but also might be draining and irritating without proper planning. Here are some tips for making sure you make the most of your conference experience.9 Technologies Security Researchers Will Break At Black Hat
July 29, 2013 05:14 PM
This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.The Dark Side of the Internet of Things
March 25, 2013 12:37 PM
From cameras to industrial controls to GPS systems, the increased connectivity of devices leads to increased risks.Vendors Roll Out Mobile Security, Vulnerability and Forensics Tools
August 06, 2012 12:37 PM
Mobile device management (MDM) is top of mind for many nowadays, so it's not surprise that mobile security was a focus at Black Hat. Learn more about MDM products announced during the show, as well as new vulnerability management and forensics tools.Those Free Mobile Apps May Come at a Price: The Latest BYOD Threat
July 26, 2012 02:48 PM
Research from Black Hat shows that even legitimate mobile apps can still pose threats. Researchers share why, and how companies can address enterprise app security.Research: New SOHO Router Vulnerabilities May Put Enterprises at Risk
July 09, 2012 01:37 PM
A researcher will present findings at Black Hat later this month regarding a new vulnerability in small office, home office wireless routers that gives an attacker root-level access, along with the ability to extract arbitrary files from the router file systems, including plain-text passwords.Black Hat Will Once Again Show Our Security Weaknesses
August 01, 2011 11:15 AM
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.Cisco Says It Can't Confirm PIX Flaw
August 15, 2006 10:51 PM
After nearly three weeks of investigating a potential vulnerability in its PIX 500 Series Security Appliances, Cisco on Tuesday said it hasn't been able to confirm that the flaw isBlack Hat: Vista Vulnerable To Stealthy Malware Despite Body Cavity Search
August 04, 2006 04:00 AM
A security researcher demonstrated how to trick the Windows Vista Beta 2 kernel, x64 edition, into allowing any unsigned device driver to be loaded onto a user's system. This opensCisco's Chief Security Officer Explains NAC Strategy Shift
August 03, 2006 07:00 PM
At the Black Hat security conference in Las Vegas this week, Cisco Systems chief security officer John Stewart discussed recent developments in Cisco's network admission control (NAC) initiative as well1 | 2 | Next Page »










