Chris Valasek and Charlie Miller: How to Secure Autonomous Vehicles
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Vulnerabilities in healthcare devices and hospital systems are leading to growing concerns in the infosec community about patient safety.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attacks before they affect any organization. However, the same technology can also be weaponized by threat actors to power a new generation of malware that can evade even the best cyber-security defenses and infects a computer…
Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale. Dubbed Social Mapper, the facial recognition tool automatically searches for targets across eight social media platforms, including—Facebook, Instagram, Twitter, LinkedIn, Google+, the Russian social networking site VKontakte, and…
Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
At Black Hat, Google’s Parisa Tabriz discussed how to navigate the complex security environment with long-term thinking and a policy of open collaboration.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
In mixed-design radio chips the processor’s activity leaks into the analog portion of the chip – and is broadcast as output.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations. Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a…