Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack
CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution.
As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater.
The recently discovered BadTunnel could mean bad news for Microsoft Windows users — that is, unless they move to patch their systems immediately.
Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. The 6-day event begins with four days (July 30 – August 2) of intense trainings for security practitioners of all levels, followed...
There are dozens of exciting security conferences taking place across the world in 2016. Check out our top picks for the best bets of the year.
Password access managers may be the most viable solution to the lack of security surrounding login credentials — if they are used effectively.
This year's lineup of talks at the Black Hat, DEF CON and BSides conferences was particularly interesting. Here are five of the hottest topics from Vegas.