The UK Government’s Department of Digital, Culture, Media and Sport (DCMS) has announced that firms could face fines of up to £17m or 4% of global turnover if they fail to protect themselves from cyberattacks.
Ironically named for the criminal hackers that cybersecurity pros spend their days – and not a few nights – defending against, the Black Hat Briefings quickly earned a reputation for excellent technical content.
Encryption can be the answer to many data security issues faced by small and medium businesses. Apart from protecting sensitive information from unauthorized use,this technology can also represent another step towards compliance with legislation.
A leaked document appears to contain the personal telephone numbers and email addresses for actors such as Peter Dinklage, Lena Headey and Emilia Clarke.
The Virus Bulletin 2017 Conference has announced some of its Small Talk and reserve papers that will be on the agenda of this year's event.
We all know that there is no such thing as a free lunch, or security product, so what’s the catch?
Torrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.
Apple has bowed to pressure from the regime in Beijing, and removed some VPN apps from the Chinese version of its iOS App Store.
The number of IoT devices is set to surpass 20 billion by 2020. We take a look at how connected things threaten our security as cybercriminals exploit weaknesses in the smartphones that control them.
Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.
Anton Cherepanov, a malware researcher at ESET, has picked up a Pwnie Award for Best Backdoor at this year’s ceremony at Black Hat USA 2017 in Las Vegas.
A homograph attack is what happens when attackers register domains that are similar to the originals, with valid certificates.
If industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.
This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.
When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.
Cameron Camp, in attendance at this year's Black Hat in Las Vegas, takes a closer look at attacks against physical infrastructure.
Social engineering may play a vital part in persuading a victim to open a malicious executable or website, says ESET's David Harley on social engineering and ransomware.
ESET researchers have discovered an Android app store distributing malware on a mass scale.
A new £20 million cybersecurity programme to train teenagers will be launched in the UK this autumn, as part of the government’s plans to address the skills gap.
It seems that Spiderman is in a spot of trouble, tangled in a web of his own making.