After welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming?
Search results for: "blackhat"
Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
For years scammers and hackers focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security, trying to illuminate possible chinks in the armor. From
Blackhat keynote speaker Shawn Henry, the former executive assistant director of the FBI’s Criminal, Cyber, Response and Service Branch, started off the day after opening remarks from Jeff Moss, founder of Blackhat. Moss wondered if now was the time for the cyber-security sector to take a more aggressive/offensive approach. Jeff mentioned working for a former
If you could use texting to break networks, what could you do? Well, Don Bailey, with ISEC Partners, in his talk today at Blackhat, muses that you could break a lot, driving around and dropping in on various networks as you saw fit. Well, really his proof-of-concept collection of tools is aimed at educating mobile
Finally seated in the crowded auditorium at Blackhat 2011, our first keynote speaker, Cofer Black, a veteran government intel mainstay, regales us with the US threat stance and endeavors, mostly in the physical arena of combat and operations. Then he relates it to the cyber arena. Referencing the U.S. Government’s highest priority threats, which used
Here's another post from our colleagues in Spain (http://www.eset.es): mistakes in interpretation are down to me (David Harley). We have frequently talked about and shown examples of threats that take advantage of Black-Hat SEO (Search Engine Optimization). This technique (BHSEO) is used by malware authors to position the malicious links in the top results when a potential
Thanks to Marcin Gajewski for pointing out that Lech Kaczynski was the President of Poland, not the Prime Minister. I really shouldn't try to blog after a full day's travelling :( While I was enjoying a rare few days off, my colleagues at ESET Latin America were posting a blog article about the ugly way in
With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware
At Black Hat USA 2020, ESET researchers delved into details about the KrØØk vulnerability in Wi-Fi chips and revealed that similar bugs affect more chip brands than previously thought
A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
WannaCryptor is still alive and kicking, so much so that it sits atop the list of the most commonly detected ransomware families
ESET researchers analyze new TTPs attributed to the Turla group that leverage PowerShell to run malware in-memory only
Proper preparation can make all the difference when it comes to speaking at conferences
Aiming to protect critical infrastructure against attacks
Healthcare sectors, critical manufacturing, food production and transportation also said to be targets for cybercriminals
Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.
As the world celebrates International Internet Day, we take a look at how cybercriminal activity has evolved online.
Cybercrime has established itself as a permanent fixture in 21st century life, with the number of incidents and victims continuing to rise with dogged determination.