Two academics discussed just how woefully inadequate some services are encryption-wise in a talk at Black Hat on Thursday.
Dell SecureWorks today published a report at Black Hat USA 2016 on a Nigerian Business Email Compromise scam called “wire-wire”, or “waya-waya.”
Dan Kaminsky advocates fixing today’s internet before it breaks the same way it did in the 1990s.
Black market machine trading has gone beyond the sale of servers and now includes PCs located on corporate networks or that contain sensitive data.
Researchers at Endgame are expected at Black Hat to introduce Hardware Assisted Control Flow Integrity (HA-CFI), which leverages features in the micro-architecture of Intel processors for security.
Sniffing HTTPS URLs with malicious PAC files gets easier with a new technique that exploits flaws in the Web Proxy AutoDiscovery protocol.
The Tor Project accuses the FBI of paying Carnegie Mellon University $1 million to attack Tor hidden services and uncloak users of the anonymity network.
The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.
At Black Hat, two recent Boston University computer engineering graduates revealed software and hardware hacks against the latest versions of the popular Square Reader.