Black Hat is one of the premier venues for information security researchers to demonstrate hacking techniques, serious software vulnerabilities and other weaknesses that pose a threat to enterprises and individuals. The Black Hat 2012 Conference consists of training sessions for malware analysts, security response teams, forensics investigators and other IT security pros, followed by two days of briefings where top security researchers highlight their reverse engineering projects and present their latest vulnerability findings in the areas of authentication, encryption and software security. The work is applied to a variety of hardware and software systems.
This year's session tracks focus on mobile threats and weaknesses, attack detection and defenses, and software exploitation. The Black Hat 2012 event sheds light into dangerous emerging threats and often prompts predictions of future problems that could hinder security and privacy.
Table of contents:
Black Hat 2012: Exploits and Vulnerabilities News
More Exploit and Vulnerability News
- Black Hat panelists: Humans, not code, are the targets
- Miller shows NFC hack, pwns smartphone
- Google Bouncer compromises tax Android app security
- Hackers to explore malware analysis, next-gen attacks
- Windows 8 security features beat buffer overflow attacks
- Google Chrome sandbox security flaws to be exposed
Black Hat 2012 hackers to pick apart mobileIn this podcast, the SearchSecurity editorial team preview some of the mobile sessions at the 2012 Black Hat Briefings in Las Vegas. Researchers will be picking apart all the major mobile platforms, NFC payment technology, and uncovering weaknesses in cellular architectures. Apple will speaking publicly for the first time about its security processes.
Black Hat 2012: Security Research News
More Security Research News
- Dan Kaminsky tackles secure software development
- Luminaries worried about social engineering techniques
- MITRE to detail STIX cyberthreat intelligence system
- Malware analysis system could aid research, boost defenses
- Social engineering training benefits IT teams, end users
- Phoenix, Black Hole toolkits rising in sophistication