Tips & advice


3153 articles

Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.

Cameron Camp15 Aug 2023


Black Hat 2023: How AI changes the monetization of search

Black Hat 2023: How AI changes the monetization of search

Black Hat 2023: How AI changes the monetization of search

Search engines, AI, and monetization in the new era

Tony Anscombe14 Aug 2023


Black Hat 2023: AI gets big defender prize money

Black Hat 2023: AI gets big defender prize money

Black Hat 2023: AI gets big defender prize money

Black Hat is big on AI this year, and for a good reason

Cameron Camp14 Aug 2023


Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks

Tony Anscombe12 Aug 2023


Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 2023


Time is money, and online game scammers have lots of it

Time is money, and online game scammers have lots of it

Time is money, and online game scammers have lots of it

Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?

Márk Szabó07 Aug 2023


Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?

Márk Szabó03 Aug 2023


The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor02 Aug 2023


Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 2023