Django: BREACH Attack Against HTTPS Can Be Used to Compromise CSRF Protection

Django: BREACH Attack Against HTTPS Can Be Used to Compromise CSRF Protection

The BREACH attack allows cybercriminals to intercept information from HTTPS traffic

Samsung Smart TVs Can Be Hijacked, Researchers Warn

Samsung Smart TVs Can Be Hijacked, Researchers Warn

Hackers can use the device's webcam to spy on the owner

Black Hat USA 2013 Keynote by General Keith Alexander – Video

Black Hat USA 2013 Keynote by General Keith Alexander – Video

The NSA chief was booed and accused of lying to Congress

Expert Uses Decoy Water Plant to Show Chinese Hackers Are Targeting ICS

Expert Uses Decoy Water Plant to Show Chinese Hackers Are Targeting ICS

Trend Micro's Kyle Wilhoit presented his findings at Black Hat 2013

Flaws in UEFI Implementation Can Be Abused to Bypass Windows 8 Secure Boot

Flaws in UEFI Implementation Can Be Abused to Bypass Windows 8 Secure Boot

Researchers have presented two attack methods at Black Hat 2013

JavaScript Attacks Can Be Used to Steal Web Browser Data, Experts Warn

JavaScript Attacks Can Be Used to Steal Web Browser Data, Experts Warn

Security researcher Paul Stone presented his techniques at Black Hat 2013