Blackhatconference

08.04.11
Google search opens SCADA systems to doomsday scenarios
08.04.11

Google search opens SCADA systems to doomsday scenarios

Google, the service so great it became a verb, can now add security risk to its roster of unint...

View
07.22.11
Several Apple notebook models susceptible to battery hack
07.22.11

Several Apple notebook models susceptible to battery hack

Security researcher Charlie Miller discovered a potential vulnerability affecting the batteries...

View
A newsletter a day keeps the FOMO at bay.
Just enter your email and we'll take care of the rest:
01.23.11
Hackers disguise phone as keyboard, use it to attack PCs via USB
01.23.11

Hackers disguise phone as keyboard, use it to attack PCs via USB

We've seen hackers use keyboards to deliver malicious code to computers, and we've seen smartphones...

View
07.21.10
Researcher will enable hackers to take over millions of home routers
07.21.10

Researcher will enable hackers to take over millions of home routers

Cisco and company, you've got approximately seven days before a security researcher rains down expl...

View
02.12.10
Christopher Tarnovsky hacks Infineon's 'unhackable' chip, we prepare for false-advertising litigation
02.12.10

Christopher Tarnovsky hacks Infineon's 'unhackable' chip, we prepare for false-advertising litigation

As it turns out, Infineon may have been a little bit... optimistic when it said its SLE66 CL PE was...

View
02.21.08
Researchers claim GSM calls can be hacked on the cheap
02.21.08

Researchers claim GSM calls can be hacked on the cheap

Callers, your worst nightmare is coming true... maybe. According to a report, a group of hackers a...

View
02.21.08
Researchers claim GSM calls can be hacked on the cheap
02.21.08

Researchers claim GSM calls can be hacked on the cheap

Callers, your worst nightmare is coming true... maybe. According to a report, a group of hackers a...

View

Sponsored Links