Black Hat is one of the premier venues for information security researchers to demonstrate hacking techniques, serious software vulnerabilities and other weaknesses that pose a threat to enterprises and individuals. The Black Hat 2012 Conference consists of training sessions for malware analysts, security response teams, forensics investigators and other IT security pros, followed by two days of briefings where top security researchers highlight their reverse engineering projects and present their latest vulnerability findings in the areas of authentication, encryption and software security. The work is applied to a variety of hardware and software systems.
This year's session tracks focus on mobile threats and weaknesses, attack detection and defenses, and software exploitation. The Black Hat 2012 event sheds light into dangerous emerging threats and often prompts predictions of future problems that could hinder security and privacy.
Table of contents:
Black Hat 2012: Exploits and Vulnerabilities News

David Litchfield slams Oracle database indexing
At Black Hat 2012, longtime Oracle thorn David Litchfield presents working exploits targeting Oracle database indexing vulnerabilities.Poor mobile app security drains enterprise data
Mobile apps collect a myriad of data sources from contacts to location information and could also be accessing sensitive enterprise data.More Exploit and Vulnerability News
- Black Hat panelists: Humans, not code, are the targets
- Miller shows NFC hack, pwns smartphone
- Google Bouncer compromises tax Android app security
- Hackers to explore malware analysis, next-gen attacks
- Windows 8 security features beat buffer overflow attacks
- Google Chrome sandbox security flaws to be exposed
Black Hat 2012 hackers to pick apart mobile
In this podcast, the SearchSecurity editorial team preview some of the mobile sessions at the 2012 Black Hat Briefings in Las Vegas. Researchers will be picking apart all the major mobile platforms, NFC payment technology, and uncovering weaknesses in cellular architectures. Apple will speaking publicly for the first time about its security processes.Black Hat 2012: Security Research News

Apple tech talk a missed opportunity, researchers say
Thursday's Apple tech talk marked its first public discussion about iOS security, but only covered what security researchers already know.Limited release for tool allowing smart meter hacks
Don Weber of InGuardians is releasing his smart meter hacking tool, but only to utilities, vendors and vendor-vetted researchers.More Security Research News
- Dan Kaminsky tackles secure software development
- Luminaries worried about social engineering techniques
- MITRE to detail STIX cyberthreat intelligence system
- Malware analysis system could aid research, boost defenses
- Social engineering training benefits IT teams, end users
- Phoenix, Black Hole toolkits rising in sophistication
Black Hat 2012 Insider Analysis
Security visibility and the hidden message
SearchSecurity.com Black Hat 2012 contributor Jennifer Minella says security visibility was the underlying theme of this year's event.Ten must-see Black Hat 2012 sessions
Insider Jennifer Jabbusch Minella ranks the top 10 Black Hat 2012 sessions on the conference agenda.Podcast: Trey Ford on Black Hat 2012 security conference
Security expert Trey Ford talks about the upcoming the Black Hat security conference. Ford is general manager of Black Hat 2012.More Insider Analysis
Black Hat 2012 Video Interviews
Meet our team
Michael Mimoso, Robert Westervelt and Jennifer J. Minella bring you news and analysis from Black Hat 2012. Follow them on Twitter: Mike Mimoso; Rob Westervelt; Jennifer Minella.
Security Management Strategies for the CIO