Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.
If industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.
This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.
Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.
The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.
It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.