Black hat

08.04.11
Hackers break into Subaru Outback via text message
08.04.11

Hackers break into Subaru Outback via text message

We've already seen SCADA systems controlled by Google Search, and now the Black Hat Technical Sec...

View
08.04.11
Google search opens SCADA systems to doomsday scenarios
08.04.11

Google search opens SCADA systems to doomsday scenarios

Google, the service so great it became a verb, can now add security risk to its roster of unint...

View
07.22.11
Charlie Miller finds MacBook battery security hole, plans to fill with Caulkgun
07.22.11

Charlie Miller finds MacBook battery security hole, plans to fill with Caulkgun

Those batteries have probably met a worse fate than the white MacBook line they came from. Accord...

View
03.08.11
Black Hat security conference offers two-day Macsploitation class
03.08.11

Black Hat security conference offers two-day Macsploitation class

Attention would-be Mac hackers and those hoping to write viruses and malware for Mac OS X! You...

View
01.23.11
Hackers disguise phone as keyboard, use it to attack PCs via USB
01.23.11

Hackers disguise phone as keyboard, use it to attack PCs via USB

We've seen hackers use keyboards to deliver malicious code to computers, and we've seen smartphones...

View
07.29.10
Why Apple's "walled garden" is a good idea
07.29.10

Why Apple's "walled garden" is a good idea

Many developers and users of Apple's iOS devices bemoan the "walled garden" of the App Store approva...

View
07.29.10
Some Windows CE-based ATMs especially generous (and vulnerable to hackers)
07.29.10

Some Windows CE-based ATMs especially generous (and vulnerable to hackers)

Speaking at the Black Hat conference in Las Vegas, a fellow named Barnaby Jack (really!) used custo...

View
07.29.10
Lookout's App Genome Project warns about sketchy apps you may have already downloaded
07.29.10

Lookout's App Genome Project warns about sketchy apps you may have already downloaded

If you're an iPhone user, the only privacy notice you'll see from an app regards your current locat...

View
07.21.10
Researcher will enable hackers to take over millions of home routers
07.21.10

Researcher will enable hackers to take over millions of home routers

Cisco and company, you've got approximately seven days before a security researcher rains down expl...

View