Don’t Skype and type
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
46 articles
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
We hope that you find these five papers helpful in building out training for your staff
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
Up close and personal, one Kaspersky Labs editor’s experience with the system failure at Delta Air Lines.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Short-term rental sites are great for travelers and homeowners. The Wi-fi? Maybe not so much.
How concerned should we be with industrial security?
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Top-level IT security pros believe there’s a significant, unaddressed gap between enterprise security priorities and the serious threats that keep them awake at night.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.