Skip to Main Content

Black Hat

Latest Stories

What to Expect at Black Hat 2020

Black Hat is the place security researchers, hackers, and members of the press get together to exchange their latest discoveries in the security field. This year, there’s no getting together, just virtual sessions. Will it still fly?

By Neil J. Rubenking  & Max Eddy

Black Hat Attendees: Sponsored Session Was 'Snake Oil Crypto'

A controversial sponsored session at the Black Hat security conference led attendees to dismiss the talk as pseudoscience. Black Hat has since removed the materials from its site.

By Max Eddy
Crown Sterling

Black Hat 2019: The Craziest, Most Terrifying Things We Saw

Black Hat is over for another year, but we'll be thinking of the fascinating and terrifying things we heard and saw for years to come.

By Neil J. Rubenking  & Max Eddy
blackhat2019

Russian Intel Agencies Are a Toxic Stew of Competition and Sabotage

Western audiences might view the disarray in Russian's intelligence agencies as a good thing, but security expert Kimberly Zenz argues at Black Hat that it just encourages risky behavior.

By Max Eddy
Cyber security

Researcher Exploits GDPR Fears to Obtain Private Data

GDPR grants you the right to access any personal data a company or other entity holds about you. But how are companies verifying that those data requests are legitimate? Some are not, one researcher revealed at Black Hat.

By Neil J. Rubenking
GDPR, data privacy

Detecting Deepfakes May Mean Reading Lips

At the Black Hat security conference, researchers evaluated the deepfake detection tools currently available and released their own mouth-centric deepfake detector.

By Neil J. Rubenking  & Max Eddy
Deepfake (ALEXANDRA ROBINSON/AFP/Getty Images)

Apple Beefs Up Its Bug Bounty Program With $1M Prize

The program will be 'open to all starting this fall' and expand to tvOS, iPadOS, watchOS, and macOS with a $1 million bounty.

By Neil J. Rubenking
iPhone Security

What Are the Rules of Engagement in a Cyberwar?

When is it appropriate to respond to a cyberattack by launching missiles? At Black Hat, security expert Mikko Hypponen exhaustively explored the topic.

By Neil J. Rubenking
Cyberwar, China, Chinese hack

How Often Can One Program Infect Another? Let Us Count the Ways

At Black Hat, experts from SafeBreach report on the many different ways a malicious program could infect another process with its own code. Spoiler alert: it's a lot.

By Neil J. Rubenking
Malware, computer virus, bug

Researcher Breaches iPhone by Sending an iMessage

At Black Hat, a Google security researcher details numerous bugs in iMessage that could be exploited remotely without interaction from the victim.

By Max Eddy
Holding Phone iMessage

Bogus Satellite Nav Signals Send Autonomous Cars Off the Road

At the Black Hat security conference, a researcher demonstrated how making tweaks to navigation signals could send a self-driving car careening off the road.

By Max Eddy
Transportation Tech

5G Is the Future of Wireless, But It Has Weaknesses

At Black Hat, a researcher shows how to identify devices connected to 5G base stations and modify what those devices can do on the network.

By Max Eddy
Communication Tower

Security Researcher Says He Cracked 787 Airliner, But Boeing, FAA Disagree

A controversial talk at the Black Hat security conference revealed several possible attacks on the Boeing 787, but the airplane manufacturer disputes the claims.

By Max Eddy
United Airlines Boeing 787-9 Dreamliner landing in London Heathrow

The Evolution of Russia's Dark Web

Russia is the birthplace of the dark web, and its tech-savvy population includes some brilliant hackers. We talk to two researchers who will present a report on the topic here at Black Hat.

By Neil J. Rubenking
Russia Data Flag

How Lab Mice Are Helping Detect Deepfakes

Systems for detecting fake audio and video are improving, but actually solving the problem may require thinking outside the box. Enter the mice.

By Neil J. Rubenking
Deepfakes

APT41 Is Not Your Usual Chinese Hacker Group

APT41 is 'highly agile and persistent,' FireEye says. In one instance, the group deployed over 150 unique pieces of malware in a year-long campaign against a single target.

By Max Eddy
Chinese Data Flag

Spectre, Meltdown Patches Won't Fix New 'SwapGS' Intel Flaw

The SwapGS chip-level vulnerability is serious, according to Bitdefender, but unless you're a CEO, head of state, or some other prominent target, you're probably safe from harm.

By Neil J. Rubenking
Security vulnerability vulnerabilities

Russian Hackers Spy on Companies With Insecure Office Devices

In April, the hackers compromised VoIP phones, office printers, and video decoders across multiple corporations, Microsoft said in security research presented at Black Hat.

By Michael Kan
Internet of Things and Cyberattack Symbols

Black Hat 2019: What We Expect

The annual hacking and security conference is upon is again. Experts and researchers from all over the world will present their alarming and encouraging takes on vulnerabilities, exposures, and privacy risks. Here’s what we’re hoping to see.

By Neil J. Rubenking  & Max Eddy
black hat

17 Remarkable (and Scary) Things We Saw at Black Hat 2018

From breaking voice authentication and remote-controlling airplanes to hijacking emergency sirens and protecting self-driving cars, this year's Black Hat conference was a wild ride.

By Neil J. Rubenking  & Max Eddy
What We Saw at Black Hat 2018