Previewing Black Hat 2022
A look at what experts at Kaspersky will be watching during Black Hat 2022.
26 articles
A look at what experts at Kaspersky will be watching during Black Hat 2022.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
A preview of Black Hat 2020 with Eugene Kaspersky, Kurt Baumgartner, and Costin Raiu.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
How security researchers were able to track down cryptocurrency bots on Twitter.
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.
Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it’s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not that hacking a chemical
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.