Why Google Has Yet to Fix Chromecast Flaw One Year Later
NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a flaw in Chromecast that was demonstrated at last year's Black Hat security...
View ArticleDDoS attack takes down Valve’s $18m Dota 2 International e-Sports tournament
Matches set to be played in front of thousands at Seattle's KeyArena delayed due to DDoS attack
View ArticleNew Rig Exploit Kit snares 1.25 million victims – thanks to Adobe Flash...
Cyber crime pays: Reborn Rig Exploit Kit makes its developers $25,000 per month
View ArticleWill RBS ever learn? Its latest outage was because of a DDoS attack
Bank suffers yet another IT glitch which left customers unable to access their online banking accounts
View ArticleInside the Black Hat USA 2015 Network Operations Center
VIDEO: Welcome to the Black Hat USA 2015 NOC, the nerve center for one of the most hostile technology environments on the planet. LAS VEGAS--Inside a dark neon-lit room at the Mandalay Bay Hotel here...
View ArticleiSIGHT Partners Continues Global Expansion
New Australian Threat Analysis Center and Sales Office Extends Reach into the Asia Pacific Japan Region and Completes the Company’s “Follow the Sun” Global Threat Analysis CapabilityDallas, TX – August...
View ArticleFTC to Use DefCon Event to Strike Back Against Robocalls
The Federal Trade Commission is using the DefCon hacker conference as the venue to build interest and technology to combat robocalls. The U.S. Federal Trade Commission receives a lot of complaints from...
View ArticleEight Reasons Why Your Server Security Is Insufficient
Conventional interconnected IT environments—whether virtualized, cloud-enabled or neither—leave organizations more vulnerable to data breaches than ever before. Why is this the case? With increasing...
View ArticleKeep Dream of a Free and Open Internet Alive, Black Hat Keynoter Urges
Black Hat keynoter Jennifer Granick, director of Civil Liberties at the Stanford Center for Internet and Society, discusses the need for legal and policy change to defend Internet freedom. LAS...
View ArticleFuntenna Malware Can Use Airwaves to Steal Data
LAS VEGAS—Airwaves are used every day to transmit data via known wireless protocols, but what if a device could be manipulated to cause it to be able transmit a non-WiFi signal that no one knew about?...
View ArticleWatering Hole Campaign Compromises More Than 50 Companies
Further research into one China-linked espionage group finds a network of more than 100 Websites, serving a variety of industries and government agencies, that have been compromised to infect targets...
View ArticleChilean Service Provider IIA Selects Flexiant Cloud Orchestrator to Deliver...
Flexiant delivered IIA a complete cloud orchestration platform to get them to market quicklySantiago, Chile and London, UK - August 6, 2015 - Chilean service provider, IIA, has selected Flexiant Cloud...
View ArticleSkyscape Cloud Services Announces Latest Wave Of Price Cuts
Skyscape's customers to benefit from savings of 50% per year, with reductions applied retrospectively from 1st August 2015London - August 6, 2015 - Skyscape Cloud Services Limited, the easy to adopt,...
View ArticleContext researchers warn of compromises to corporate networks via Windows...
You have 1 malicious update ready to install…6 August 2015: Yesterday at Black Hat USA, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal...
View ArticleComputop and ACI Worldwide partner to offer eCommerce merchants integrated...
London, England - August 06, 2015 - Computop, a leading global payment service provider (PSP) has signed an agreement with global payments specialist ACI Worldwide to provide merchants an integrated...
View ArticleWindows Update vulnerability puts corporate networks at risk from malicious...
Windows Update 'may be hiding some serious threats' claim Context security researchers
View ArticleResearchers Demo How They Hacked a Jeep Remotely: Black Hat
Two researchers prove hacking a car remotely is possible and detail how they found and exposed flaws, which led Chrysler to the recall 1.4 million vehicles. LAS VEGAS—Every year, there is always one...
View ArticleOPM Wins Pwnie for Most Epic Fail at Black Hat Awards Show
LAS VEGAS—The annual Pwnie Awards at the Black Hat USA conference here celebrate the best security vulnerabilities found by researchers and also ridicule the worst security responses. The Pwnies are a...
View ArticleBlack Hat Researchers Hack Rifle for Fun
eWeek Editor's PickNews & ViewsCloud ComputingMobile and Wireless UpdateBest of eWeekeWeek Sunday BruncheCareers Smart MovesEnterprise Applications Topic Center UpdateEnterprise IT AdvantageeWeek...
View ArticleNew Techniques Could Prevent Use-After-Free Exploits: Black Hat
The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that and eliminate many UAF bugs. LAS VEGAS—Use-after-free memory flaws regularly...
View Article