Researchers to Show How iOS Devices Can Be Infected with Malware via Chargers

Researchers to Show How iOS Devices Can Be Infected with Malware via Chargers

Georgia Institute of Technology researchers will hold an interesting talk at Black Hat

Laptop Docks Can Be Used for Hardware-Based Cyberattacks, Expert Says

Laptop Docks Can Be Used for Hardware-Based Cyberattacks, Expert Says

Andy Davis of NCC Group will present his findings at Black Hat Europe

Company Promises to Address Vulnerability in Hotel Room Locks

Company Promises to Address Vulnerability in Hotel Room Locks

Onity has two solutions: one is free and the other one will involve a nominal fee

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

Charlie Miller will present his findings at Black Hat USA 2012

Bugs Allowed Access to Black Hat Streams for Free

Bugs Allowed Access to Black Hat Streams for Free

A combination of logic flaws and system misconfiguration

Security Researcher Pressured into Canceling Talk on Chinese Cyber Army

Security Researcher Pressured into Canceling Talk on Chinese Cyber Army

Taiwan and China consider the information to be too sensitive

  • iPhone
  • By Ionut Arghire
  • July 31st, 2009
iPhone Hacks Demoed at Black Hat

iPhone Hacks Demoed at Black Hat

An SMS vulnerability is the most critical issue

Upcoming ATM Hack Demo at Black Hat Gets Canceled

Upcoming ATM Hack Demo at Black Hat Gets Canceled

Juniper stops its employee from going public at the request of ATM vendor

Hacker Journalists Expelled from Black Hat

Hacker Journalists Expelled from Black Hat

They obtained private login information of their colleagues

Email Security Threatened by DNS Flaw

Email Security Threatened by DNS Flaw

Warns the IOActive specialist who discovered the bug

Hackers Ger Ready for Windows Vista x64 Onslaught

Hackers Ger Ready for Windows Vista x64 Onslaught

IsGameOver(), anyone?

 
Want more? Browse: