Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
X-Force Red offers vulnerability analytics backed by the experience of hundreds of thousands of the world's best technologists.
A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack
CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution.
A security researcher has discovered a way to hack a self-driving car relatively easily and for little money using a makeshift laser pointer.
A new Android vulnerability has come into the spotlight, causing some Samsung and LG smartphone users to think twice about their authentications.
At the most recent Black Hat USA conference in Las Vegas, security experts told IBM what they want out of an application security testing tool.
Two weeks after vulnerabilities were revealed at DEF CON, a major piece of SCADA software remains unpatched, ICS-CERT has warned.
This year's lineup of talks at the Black Hat, DEF CON and BSides conferences was particularly interesting. Here are five of the hottest topics from Vegas.