Quantcast
Channel: MIT Technology Review - Black Hat
Browsing all 20 articles
Browse latest View live

Got an iPhone? There's an App for Hacking That

New attacks highlight the growing threat to smart phones.Over the past few years, researchers have warned that viruses and other security threats could soon start appearing on mobile devices. The buzz...

View Article



Worldwide Cyber Espionage Revealed

The attacks are evidence of a growing political motivation among hackers.Details of a highly organized, sustained campaign of computerized attacks against businesses and governments across 14 countries...

View Article

Black Hat: Legal Pitfalls of Investigating Mobile

Researchers studying mobile devices often find themselves on shaky ground.Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to...

View Article

When Social Media Mining Gets It Wrong

Big problems could be ahead if we rely on conclusions drawn from individuals’ social-networking data.A complex picture of your personal life can now be pieced together using a variety of public data...

View Article

Fighting Hackers without Sinking to Their Level

At this year’s Black Hat hacker conference in Las Vegas, attention turns from defense to offense.With cyber attacks that steal valuable intellectual property on the rise, companies need to consider...

View Article


Mobile Payment Chips Could Let Hackers into Your Phone

Near-field communication chips may let smartphones replace cash and credit cards—but they could also offer opportunities to hackers.In a packed room at the Black Hat computer security conference in Las...

View Article

GPS Weakness Could Enable Mass Smartphone Hacking

A malicious Wi-Fi network could command devices to report future movements—and perhaps snoop on private data.Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map,...

View Article

Google Approves an App that Steals All Your Data

The automated system designed to keep malware out of Google’s app store proves easy to evade.Google’s automated “Bouncer” for apps, which should prevent harmful mobile software from appearing in the...

View Article


New Web Standards Bring New Security Worries

HTML5, which enables Web pages to mimic conventional software, also introduces new security problems.A suite of tools known collectively as HTML5 is tipped to make websites as complex and powerful as...

View Article


Hey, Hackers: Defense Is Sexy, Too

Is the computer security community so obsessed with demonstrating scary new attacks that it has neglected to improve defenses?Pleasing the crowd at the Black Hat and Def Con computer security...

View Article

NSA Chief Says U.S. Phone, Web Surveillance Sets “Standard for Other Countries”

There are tight controls on the NSA’s access to U.S. phone records and data from U.S. Internet companies, the agency’s director says.The National Security Agency’s collection of phone records and...

View Article

Hacking Industrial Systems Turns Out to Be Easy

New research from Black Hat shows it’s possible to trick water and energy infrastructure to cause physical damage—and securing these systems remains painfully slow.Three presentations scheduled to take...

View Article

Web Ads Used to Launch Online Attacks

Researchers show how easy it is to hide code in online ads that can turn people into an online attack squad.Online advertising networks could be used to enlist millions of unsuspecting Web surfers in...

View Article


Math Advances Raise the Prospect of an Internet Security Crisis

Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.The encryption systems used to secure online bank accounts and keep...

View Article

Chinese Hacking Team Caught Taking Over Decoy Water Plant

A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.A Chinese hacking group accused this February of being tied to the Chinese army was...

View Article


Black Hat: Most Smartphones Come with a Poorly Secured Back Door

A system designed to let carriers remotely install software on phones, or change their settings without a user noticing, is open to abuse.A powerful remote-control system installed on most smartphones...

View Article

Black Hat: Google Glass Can Steal Your Passcodes

Footage of people unlocking their phones can be used to steal mobile passcodes even if the typing can’t be seen.Criticism of Google Glass has often focused on the way its camera makes surreptitious...

View Article


Black Hat: Car Security Is Likely to Worsen, Researchers Say

In-car applications and wireless connectivity are a boon to hackers who take aim at cars.As more cars come with wireless connectivity and in-car apps, more of them will be vulnerable to potentially...

View Article

Malware Traffic Spikes Preceded Russian and Israeli Conflicts

Government hackers apparently went to work as Israel and Russia ramped up military action this year.A study of malware operating on corporate and government networks suggests that the communication...

View Article

Black Hat: More Internet-Scale Bugs Are Likely Lurking

A survey of software libraries used in many companies’ products suggests we may see more incidents like the Heartbleed bug.For a few days in April, the whole world seemed to take Internet security very...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images