Hack mobile point-of-sale systems? Researchers count the ways
Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.
By Karen Epper Hoffman | 16 Aug | Read more
Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.
By Karen Epper Hoffman | 16 Aug | Read more
Kevin Mitnick, arguably the world’s most famous hacker, is coming to Australia as part of a conference tour of the region later this month.
Andrew Colley | 09 Nov | Read more
What should a CISO be doing in today's business and security environment?
Paul Wallbank | 12 Aug | Read more
Using AWS’s API software developer’s kit or its command line interface, customers can write their own tools for imaging disk instances that have been compromised, say Andrew Krug and Alex McCormack. The pair if researchers presented four tools at Black Hat 2016 that they wrote specifically to deal with incident response in AWS.
Tim Greene | 12 Aug | Read more
Samsung said that reports of a vulnerability in Samsung Pay mobile payments were "simply not true" -- but also admitted that token skimming was, in fact, possible but difficult enough that the potential risk was acceptable
Maria Korolov | 11 Aug | Read more
Facebook Live stream captures latest news on computer bugs & real insects
When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.
Tim Greene | 29 Jul | Read more
National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event
A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it.
Tim Greene | 22 Jul | Read more
If you still haven't seen the new movie Michael Mann movie, Blackhat, with Chris Hemsworth playing the lead, you won't be getting any new insights into how hackers work.
Maria Korolov | 03 Feb | Read more