Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B
You’ve heard about Trustworthy Computing and you’ve seen some security improvements from Microsoft.
The OODA Loop theory was conceived by Col John Boyd, AF fighter pilot. He believed that a pilot in a
A fundamental of many SAN solutions is to use metadata to provide shared access to a SAN. This is tr
This topic will present a new web-app/DB pen-test tool. This tool supports both proxy (passive) mode
Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies,
This talk provides an overview of new RFID technologies used for dual-interface cards (credit cards,
Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating syste
Hotpatching is a common technique for modifying the behavior of a closed source applications and ope
This presenation will offer a technical overview of the security engineering process behind Windows
How often have you encountered random-looking cookies or other data in a web application that didn‚t
There is an often overlooked security design flaw in many web applications today. Web applications o
Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemen
Ajax can mean different things to different people. To a user, Ajax means smooth web applications li
How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, s
In the past couple years there have been major advances in the field of rootkit technology, from Jam
Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on el
TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial
If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you
Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the
The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) techno