Previewing Black Hat 2022
A look at what experts at Kaspersky will be watching during Black Hat 2022.
33 articles
A look at what experts at Kaspersky will be watching during Black Hat 2022.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
A preview of Black Hat 2020 with Eugene Kaspersky, Kurt Baumgartner, and Costin Raiu.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
How security researchers were able to track down cryptocurrency bots on Twitter
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
In an earlier post from Black Hat, I discussed how car washes could be hacked. Today, we can remove the “wash” part and simply focus on the car. More specifically,
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.