News

AI is big at Black Hat this year, but the question is whether it is only the newest fad, or an actually useful tool.
“Black hats” are hackers with malicious intentions. They break into computers to steal data and hold companies or people to ransom. The moniker satisfies a hacker’s craving for adventure.
Kim Komando answers questions about hackers, smart tech for seniors, how to archive your analog and much more.
In his Black Hat keynote address, Dino Dai Zovi, mobile security lead at Square, discussed how security development has segued into software development. According to Dai Zovi, there are three ...
"A black hat hacker may spend three weeks in the intelligence gathering phase; they may spend three hours to three minutes exploiting it; and it may take three years before it's discovered ...
Security expert David Holmes asked three dozen white hat hackers to get a sense of what kept them on the side of the good guys.
LAS VEGAS — Hordes of security professionals, hackers, federal agents and media invaded Las Vegas this week to attend the Black Hat and Defcon conferences. The two conferences once again ...
Black hat hacking raises concerns about cybersecurity, prompting discussions on protection and prevention strategies.
Thousands of security professionals, hackers, federal agents and media descended on Las Vegas this week to attend the Black Hat and Defcon conferences. The two conferences exhibit the extremes of ...
LAS VEGAS — Two noted security professionals were targeted this week by hackers who broke into their web pages, stole personal data and posted it online on the eve of the Black Hat security ...