Post Thumbnail

Following its decision to charge five Chinese officials for allegedly stealing trade secrets, the US is apparently ready to take further action. Reuters reports that the US government may impose visa restrictions on Chinese computer experts, stopping them from attending the high-profile Def Con an...

1 year ago 0 Comments
May 25, 2014 at 7:11AM
Post Thumbnail

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get all the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the inline player (requires ...

2 years ago 0 Comments
Post Thumbnail

CNET's posted a strange writeup for Apple's first talk at the Black Hat security conference, and though the piece is short on details, the theme is clear: There wasn't a lot of groundbreaking news shown off to attendees. Manager of Platform Security Dallas De Atley basically gave a quick rundow...

2 years ago 0 Comments
Post Thumbnail

This Thursday, Apple is poised to do something its never done before --- give a formal presentation at the Black Hat security conference. According to Bloomberg, Dallas De Atley of Apple's platform security team will give a presentation on iOS security to the hackers in attendance. This isn't...

2 years ago 0 Comments
Post Thumbnail

We've already seen SCADA systems controlled by Google Search, and now the Black Hat Technical Security Conference is offering up yet another slice of cringe-inducing hacker pie. A pair of pros from iSec Partners security firm was able to unlock and start the engine of a Subaru Outback using an An...

3 years ago 0 Comments
Post Thumbnail

Google, the service so great it became a verb, can now add security risk to its roster of unintended results. The search site played inadvertent host to remotely accessed Supervisory Control and Data Acquisition (SCADA) systems in a Black Hat conference demo led by FusionX's Tom Parker. The sec...

3 years ago 0 Comments
Post Thumbnail

Attention would-be Mac hackers and those hoping to write viruses and malware for Mac OS X! You can bone up on your Macsploitation skills at an upcoming two-day class to be held at the Black Hat security conference July 30 through August 2. This isn't the first time that Black Hat has featured...

4 years ago 0 Comments
Post Thumbnail

We've seen hackers use keyboards to deliver malicious code to computers, and we've seen smartphones used as remote controls for cars and TV -- but we've never seen a smartphone disguised as a keyboard used to control a computer, until now. A couple folks at this year's Black Hat DC conference have ...

4 years ago 0 Comments
Post Thumbnail

Many developers and users of Apple's iOS devices bemoan the "walled garden" of the App Store approval process, but it appears that the company's measures have prevented mass data theft from iPhones, and iPads. At the Black Hat security conference being held in Las Vegas this week, mobile security...

4 years ago 0 Comments