Black Hat 2012
Black Hat continues to draw crowds, talented speakers -- and increasingly plenty of sponsors.
#BlackHat: Researchers hijack Linksys router with JavaScript 
By Fahmida Y. Rashid | Jul 31, 2012 | Comment Now 
Multi-pronged attack on home routers.
 
#BlackHat: Researchers bypass iris scanners with biometric clones 
 
Photos: BlackHat 2012 
By Darren Pauli | Jul 30, 2012 | Comment Now 
Highlights from BlackHat, courtesy of the conference organisers.
 
#BlackHat 2012 in pictures 
By Darren Pauli | Jul 30, 2012 | Comment Now 
Highlights from BlackHat, courtesy of the con organisers.
 
#BlackHat: Phones hijacked by malicious NFC tag 
By Marcos Colon | Jul 30, 2012 | Comment Now 
Android, Nokia compromised.
 
#BlackHat Mac rootkit bypasses Filevault, installs at boot 
By Darren Pauli | Jul 27, 2012 | Comment Now 
Meet Evil Maid's unstoppable ugly sister.
 
#BlackHat: Supressed smart meter vulnerability tool is unleashed 
By Dan Kaplan | Jul 27, 2012 | Comment Now 
Allows for wireless access to meters.
 
#BlackHat Video: How four million hotel locks failed 
By | Jul 27, 2012 | Comment Now 
Cody Brocious talks about the widespread lock vulnerability.
 
#BlackHat: FBI says learn network defence from SWAT 
By Dan Kaplan | Jul 27, 2012 | Comment Now 
Use your home field advantage.
 
#BlackHat: How exploit kits fuel online crime 
By Dan Kaplan | Jul 27, 2012 | Comment Now 
Researcher examines how exploit kits function and who profits off them.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 581

Vote