News

Thousands of security professionals, hackers, federal agents and media descended on Las Vegas this week to attend the Black Hat and Defcon conferences. The two conferences exhibit the extremes of ...
The technique of hiding malicious code in images is not new. Cybercriminals can modify files to hide scripts and code in email attachments, PDFs, Excel files, PNGs, JPGs, and even in the body of ...
A black and white issue In pop culture, the word “hacker” has long carried sinister connotations, often used to conjure images of a criminal invading a private network to spy or steal personal data ...
Black Hat: Hackers can remotely hijack enterprise, healthcare Temi robots Temi’s interactive assistance robots are remotely exploitable with little more than a phone number.
Some of the most renowned black hat hackers are now working for the companies and institutions that they hacked.
Kim Komando answers questions about hackers, smart tech for seniors, how to archive your analog and much more.
A tradition at Black Hat is the Pwnie Awards, which recognize achievements and failures during the 12 month period leading up to the event.
At the annual Black Hat Briefings conference this week, hackers, computer security managers and law enforcement officials talked about their respective roles in securing the Internet.
"White-hat hackers" are the good guys -- paid by companies to hack their systems and find flaws before they are exploited by cyber criminals, or "black-hat hackers".
Some of the most renowned black hat hackers are now working for the companies and institutions that they hacked.