Black Hat 2012: Special Conference Coverage

News and analysis from Black Hat 2012, July 25-26 in Las Vegas.

Black Hat is one of the premier venues for information security researchers to demonstrate hacking techniques, serious software vulnerabilities and other weaknesses that pose a threat to enterprises and individuals. The Black Hat 2012 Conference consists of training sessions for malware analysts, security response teams, forensics investigators and other IT security pros, followed by two days of briefings where top security researchers highlight their reverse engineering projects and present their latest vulnerability findings in the areas of authentication, encryption and software security. The work is applied to a variety of hardware and software systems.

This year's session tracks focus on mobile threats and weaknesses, attack detection and defenses, and software exploitation. The Black Hat 2012 event sheds light into dangerous emerging threats and often prompts predictions of future problems that could hinder security and privacy.

Table of contents:

Black Hat 2012: Exploits and Vulnerabilities News

security research news

David Litchfield slams Oracle database indexing

At Black Hat 2012, longtime Oracle thorn David Litchfield presents working exploits targeting Oracle database indexing vulnerabilities.

Poor mobile app security drains enterprise data

Mobile apps collect a myriad of data sources from contacts to location information and could also be accessing sensitive enterprise data.

More Exploit and Vulnerability News

Black Hat 2012 hackers to pick apart mobile

In this podcast, the SearchSecurity editorial team preview some of the mobile sessions at the 2012 Black Hat Briefings in Las Vegas. Researchers will be picking apart all the major mobile platforms, NFC payment technology, and uncovering weaknesses in cellular architectures. Apple will speaking publicly for the first time about its security processes.

Black Hat 2012: Security Research News

security research news

Apple tech talk a missed opportunity, researchers say

Thursday's Apple tech talk marked its first public discussion about iOS security, but only covered what security researchers already know.

Limited release for tool allowing smart meter hacks

Don Weber of InGuardians is releasing his smart meter hacking tool, but only to utilities, vendors and vendor-vetted researchers.

More Security Research News

Black Hat 2012 Insider Analysis

Security visibility and the hidden message

SearchSecurity.com Black Hat 2012 contributor Jennifer Minella says security visibility was the underlying theme of this year's event.

Ten must-see Black Hat 2012 sessions

Insider Jennifer Jabbusch Minella ranks the top 10 Black Hat 2012 sessions on the conference agenda.

Podcast: Trey Ford on Black Hat 2012 security conference

Security expert Trey Ford talks about the upcoming the Black Hat security conference. Ford is general manager of Black Hat 2012.

More Insider Analysis

Meet our team

Michael Mimoso, Robert Westervelt and Jennifer J. Minella bring you news and analysis from Black Hat 2012. Follow them on Twitter: Mike Mimoso; Rob Westervelt; Jennifer Minella.