After welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming?
Aiming to protect critical infrastructure against attacks
Ironically named for the criminal hackers that cybersecurity pros spend their days – and not a few nights – defending against, the Black Hat Briefings quickly earned a reputation for excellent technical content.
Jonathan Brossard describes an 'undetectable, unremovable' attack on firmware through gimmicked hardware or a subsequent malware attack. David Harley isn't convinced.
If your organization’s website runs on Apache, and many do, you might wonder if the webserver’s .htaccess controls are securely configured. If you believe the demo we saw yesterday at Blackhat by Matias Katz and Maximiliano Soler, the answer is a resounding ‘NO!’ What Katz and Soler described in their session is not some rare
SCADA, a network-enabled setup for controlling infrastructure, is hitting the headlines in force for falling victim to cyber scammers. There have been several incidents of unauthorized access to Supervisory Control and Data Acquisition (SCADA) systems recently, from guessing simple passwords, to full-on spear phishing attacks against a hardware vendor, which were then used to access
If Tanji'sarticle makes you more sceptical of those of us who pollute the blogosphere with our own opinions, that's a Good Thing.
I'm a believer in responsible disclosure. But...
The North American Electric Reliability Corporation’s (NERC) newly formed Cyber Attack Task Force will “consider the impacts of a coordinated cyber attack on the reliability of the bulk power system”, in a proactive effort to increase providers’ readiness for new waves of potential nastiness. Recently, there has been a flurry of activity surrounding efforts to
If you could use texting to break networks, what could you do? Well, Don Bailey, with ISEC Partners, in his talk today at Blackhat, muses that you could break a lot, driving around and dropping in on various networks as you saw fit. Well, really his proof-of-concept collection of tools is aimed at educating mobile
Mario Vuksan, Tomislav Pericin and Brian Karney have been talking...about vulnerabilities they've found in various compression formats ... as well as their potential for steganographical use or misuse.... Perhaps the main problems here will not be technical vulnerabilitiese but careless users and social engineering attacks.