AUGUST 2007 | LAS VEGAS - Black Hat USA
iPhone Exploits Revealed
Two methods that could allow criminals to break into and steal data from Apple's iPhone were demonstrated Thursday here at the Black Hat hacker conference.
Read the article HERE.
Security researchers exercise AJAX attacks
The presence of AJAX code in Web applications continues to grow at a rapid pace, but many of the programs built using the language remain extremely vulnerable to various forms of attack, according to researchers with applications testing specialists SPI Dynamics.
Presenting at the Black Hat 2007 security conference in Las Vegas, Billy Hoffman, lead researcher in SPI's Labs group, and Bryan Sullivan, one of the Atlanta-based company's senior research engineers, detailed a number of methods through which they said many common AJAX applications can be targeted by malicious hackers.
Read the article HERE.
Feds Turn to Black Hats
Some of the top names in law enforcement raided this hacker haven yesterday, but they weren't out to make a bust -- they were here to ask for help.
Nearly a dozen top-ranking government and law enforcement officials -- including the head of the FBI's cybercrime division -- spent an hour with Black Hat attendees in a session called "Meet the Fed." Their message: Work with us, not against us.
Read the article HERE.
The house always wins
A repeated source of humor this week at Black Hat has been the responses from various manufacturers when they're told that their systems are in fact hackable. My favorite was the presentation explaining how to hack the RDS-TMC radio service that delivers information about upcoming traffic jams and other disruptions to in-car satellite navigation systems.
Read the article HERE.
Two methods that could allow criminals to break into and steal data from Apple's iPhone were demonstrated Thursday here at the Black Hat hacker conference.
Read the article HERE.
Security researchers exercise AJAX attacks
The presence of AJAX code in Web applications continues to grow at a rapid pace, but many of the programs built using the language remain extremely vulnerable to various forms of attack, according to researchers with applications testing specialists SPI Dynamics.
Presenting at the Black Hat 2007 security conference in Las Vegas, Billy Hoffman, lead researcher in SPI's Labs group, and Bryan Sullivan, one of the Atlanta-based company's senior research engineers, detailed a number of methods through which they said many common AJAX applications can be targeted by malicious hackers.
Read the article HERE.
Feds Turn to Black Hats
Some of the top names in law enforcement raided this hacker haven yesterday, but they weren't out to make a bust -- they were here to ask for help.
Nearly a dozen top-ranking government and law enforcement officials -- including the head of the FBI's cybercrime division -- spent an hour with Black Hat attendees in a session called "Meet the Fed." Their message: Work with us, not against us.
Read the article HERE.
The house always wins
A repeated source of humor this week at Black Hat has been the responses from various manufacturers when they're told that their systems are in fact hackable. My favorite was the presentation explaining how to hack the RDS-TMC radio service that delivers information about upcoming traffic jams and other disruptions to in-car satellite navigation systems.
Read the article HERE.
0 Comments:
Post a Comment
<< Home