Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B
Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could
The Internet industry is currently riding a new wave of investor and consumer excitement, much of wh
In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life.
Online games are very popular and represent some of the most complex multi-user applications in the
Traditionally, host-based anomaly detection has dealt with system call sequences, but not with syste
Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live wit
Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure
Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios
There is a growing need to develop improved methods for discovering vulnerabilities in closed-source
To be able to defend against IT security attacks, one has to understand the attack patterns and henc
Social networking sites such as MySpace have recently been the target of XSS attacks, most notably t
Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dum
Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect th
Technologies emerge on a regular basis with new promises of better security. This is more or less tr
All applications and operating systems have coding errors and we have seen technical advances both i
In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking
Looking for instant gratification from the latest client side attack? Your search may be over when y
Automated identification of malicious code and subsequent classification into known malware families
Web apps continue to be the soft, white underbelly of most corporate IT environments. While the opti
Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005