Black Hat conference 2010: News, podcasts and videos

Get updates on the latest happenings at the Black Hat 2010 conference with breaking news stories, and exclusive video and podcasts.

Black Hat Conference 2010
| TOP STORIES | MORE NEWS | MULTIMEDIA | BLOG | TWITTER |

TOP STORY 
Adobe vulnerability management: Arkin on the new threat landscape
SearchSecurity.com
Adobe's Brad Arkin discusses the company's struggle to protect Reader, Acrobat and Flash, including how the company interacts with researchers and its new partnership with the Microsoft Active Protections Program.

MULTIMEDIA 
Black Hat 2010 podcast: Jim Reavis on first Cloud Security Alliance user certification
Jim Reavis, cofounder of the Cloud Security Alliance, discusses the group's first user certification, the Certificate of Cloud Security Knowledge (CCSK), the state of cloud security awareness among enterprises moving services and processes into the cloud, and how IT organizations should address security and compliance in the context of cloud computing.

Black Hat 2010: Greg Hoglund on malware attribution and fingerprinting
Greg Hoglund, founder of HB Gary Inc., presented his work on malware attribution and fingerprinting today at Black Hat in Las Vegas. In this interview, Hoglund talks about his research into looking at how to best trace malware to its author by looking at toolmarks left by the hacker within code.

Attackers are turning to mobile platforms, researcher says
SearchSecurity.com
In this interview, Mikko Hypponen, chief research officer at F-Secure Corp., talks about what he sees as the coming mobile security threats. He says money-making malware is already infecting some smartphones, but all platforms are at risk.

Black Hat 2010: Microsoft on bug disclosure, new security tool
Dave Forstrom, director of Microsoft's Trustworthy Computing, discusses Microsoft's "responsible disclosure" announcement, bug buyback programs and several other Black Hat 2010 announcements. Also, Brad Arkin, senior director of product security and privacy for Adobe Systems Inc., explains its decision to partner with Microsoft with its Active Protections Program, to give vulnerability data to security vendors prior to pushing out a patch.

Black Hat 2010: Mobile app threats
Kevin Mahaffey and John Hering of mobile security vendor Lookout Inc. explain their latest project, App Genome Project, a study of 300,000 smartphone applications. The study findings are being released this week at Black Hat 2010. The two researchers said mobile applications pose a major threat and predict it to be the next big attack vector of cybercriminals.

Security Wire Weekly podcast: Black Hat 2010 Preview
SearchSecurity.com editors Michael Mimoso and Robert Westervelt discuss this week's Black Hat conference. Also, Caleb Sima of Armorize Technologies on a sensitive Black Hat talk that has been canceled.

Interview: Security researcher, Felix "FX" Lindner
Felix "FX" Lindner, lead security researcher at Germany-based Recurity Labs, talks about a new Mozilla Firefox tool he developed that cleans SWF files making it difficult for attackers to target Flash vulnerabilities. Lindner plans to unveil the tool at Black Hat 2010 in Las Vegas. In this interview, he also talks about the difficulty of conducting security research under Germany's strict cybersecurity laws and his previous research on bar code scanner software vulnerabilities.

MORE NEWS 
Kaspersky researcher sees tough road ahead for antivirus detection
SearchSecurity.com
In this interview conducted at Black Hat 2010, Kaspersky Lab chief security expert, Vitaly Kamluk, discusses the underground market for both botnet operations and software designed to trick security vendor researchers and weaken antivirus detection..

Black Hat: Researchers poke holes in HTTPS, SSL Web browser security
SearchSecurity.com
Attackers capable of carrying out man-in-the-middle attacks to hijack Web browsing sessions can go further and render Web security protocols HTTPS and SSL/TLS useless against attack.

Black Hat: Poor SCADA systems security 'like a ticking time bomb'
SearchSecurity.com
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems and unauthorized applications.

Researchers uncover Cisco firewall vulnerabilites, McAfee console flaws
SearchSecurity.com
While vendors have released patches for the flaws, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic vulnerabilities.

Black Hat: Targeted network security attacks beating forensics efforts
SearchSecurity.com
Targeted attacks are having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat 2010.

Black Hat: DHS calls for attitude adjustment
Security Bytes blog
Wednesday's Homeland Security keynote included the tried-and-true plea for greater public-private partnership to secure cyberspace, yet served to challenge those who think securing the Internet is a lost cause.

Microsoft seeks true 'responsible' vulnerability disclosure
SearchSecurity.com
In an interview at Black Hat 2010, the software giant said it doesn't see the need to join Mozilla and Google in paying security researchers who discover bugs in its products. It also announced a new mitigation toolkit and a partnership with Adobe.

Mobile threats, SSL weaknesses, Web application bugs at Black Hat 2010
SearchSecurity.com
Security researchers converge on Las Vegas to demonstrate vulnerabilities and threats to critical infrastructure, mobile devices and Web-based applications.

Complacency over VPN security and management unacceptable
SearchSecurity.com
New research from NCP Engineering points out that companies are complacent about VPN security configurations, and poorly managed VPNs are often at the heart of large data breaches.

Armorize's Huang cancels Black Hat China talk
SearchSecurity.com
A Black Hat 2010 presentation on the hacking community in China was canceled at the request of the Taiwanese government. A new talk will focus on drive-by attacks.

Black Hat 2010: Study tests SSL protocol use, finds SSL errors
SearchSecurity.com
Ivan Ristic of Qualys Inc.'s SSL Labs is studying thousands of SSL implementations to document configuration errors and protocol issues.

Black Hat 2010: New Firefox tool to clean Adobe Flash file errors
SearchSecurity.com
Browser-based add-on, Blitzableiter, cleans SWF files prior to running on a user's computer. The tool will be released at Black Hat 2010 in Las Vegas.

BLACK HAT LAS VEGAS 2009 
Black Hat Las Vegas 2009: Special news coverage
For a look back at last year's event, check out news, features and podcasts from SearchSecurity.com's special coverage of Black Hat Las Vegas 2009.

The 2010 Black Hat conference in Las Vegas promises to expose today's most dangerous emerging security threats, including token kidnapping and search engine hacking. SearchSecurity.com and Information Security magazine editors are live in Las Vegas and ready to talk to today's security experts about the cutting-edge threats that you'll need to prepare for. Check back here for the biggest headlines, interviews and rumors, as well as videos, podcasts and more.

This was first published in July 2010

Dig deeper on Malware, Viruses, Trojans and Spyware

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close