Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B
As one of the pioneers of partnerships for the FBI, Dan Larkin of the FBI’s Cyber Division will outl
David Litchfield specializes in searching for new threats to database systems and web applications.
Lately there seems to be an explosion of press hype around the possibility of hackers exploiting Voi
In an online world, anonymity seems easy. Network addresses can be cloaked and files can be manipula
The threat of viruses, worms, information theft and lack of control of the IT infrastructure lead co
Trusted computing is considered a dirty word by many due to its use for Digital Rights Management (D
The known topics for this year include: 1. The Worldwide SSL Analysis-There's a major flaw in
Reverse Engineering has come a long way-what used to be practiced behind closed doors is now a mains
PL/SQL is the flagship language used inside the Oracle database for many years and through many vers
VoIP applications went mainstream, although the underlying protocols are still undergoing constant d
Historically, only file systems were considered as locations where evidence could be found. But what
This presentation prepares attackers and defenders to perform automated testing of some popular Wind
During this presentation SensePost will discuss and demonstrate two pieces of new technology - the S
Thomas Ptacek and Dave Goldsmith present the results of Matasano Security's research into the resili
This talk shall focus on exploit development from vulnerabilities. We have seen many postings on sec
In this talk, I will discuss some ways to circumvent common mitigations of SQL Injection vulnerabili
As many people are becoming more accustom to phishing attacks, standard website and e-mail phishing
During the course of 2005 and 2006, we have responded to dozens of computer security incidents at so
Black box testing techniques like fuzzing and fault injection are responsible for discovering a larg
Application level security is getting better. Basic stack based string overflows have become rare, a