Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers. The Briefings take place regularly in Las Vegas, Barcelona, Amsterdam, Abu Dhabi and, occasionally, Tokyo. An event dedicated to the US federal agencies is organized in Washington, D.C.

Wikipedia
Black Hat
Black Hat
YouTube Video
  • Interested in hardware hacking, but don't know where to start? This class, taught by world-renowned engineer and hacker Joe Grand, brings you through the techniques commonly used to reverse engineer and defeat the security of electronic devices. Check Out The Full Abstract & Register Here: https://www.blackhat.com/eu-17/training/schedule/index.html#joe-grands-hands-on-hardware-hacking-training-6...

Black Hat
Black Hat
YouTube Video
  • Stepping Up Our Game: Re-focusing the Security Community on Defense and Making Security Work for Everyone by Alex Stamos, Facebook CSO Since the first Black Hat conference 20 years ago, the security community, industry and the world have changed to the point that it’s time to re-examine whether we’re living up to our responsibilities and potential. Long gone are the days when “hacking” conjured ...

Black Hat
Black Hat
YouTube Video
  • Meet Broadpwn, a vulnerability in Broadcom's Wi-Fi chipsets which affects millions of Android and iOS devices, and can be triggered remotely, without user interaction. The Broadcom BCM43xx family of Wi-Fi chips is found in an extraordinarily wide range of mobile devices - from various iPhone models, to HTC, LG, Nexus and practically the full range of Samsung flagship devices. By Nitay Artenstein ...

Black Hat
Black Hat
YouTube Video
  • by Monnappa K A and Sajan Shetty Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics and incident response. With adversaries becoming more sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations, detecting, responding and investigating suc...

Black Hat
Black Hat
YouTube Video
  • In this talk we'll cover the psychology of phishing, then walk through a series of real-world attacks conducted against a Bay Area tech company - including conversion rates for each attack, and ways in which existing protections were bypassed. We'll cover recent technological advancements in this area, then combine these with our case studies to provide evidence-based techniques on how to prevent,...

Black Hat
Black Hat
YouTube Video
  • While both the SYSTEM_ALERT_WINDOW and the BIND_ACCESSIBILITY_SERVICE Android permissions have been abused individually (e.g., in UI redressing attacks, accessibility attacks), previous attacks based on these permissions failed to completely control the UI feedback loop and thus either rely on vanishing side-channels to time the appearance of overlay UI, cannot respond properly to user input, or m...

Black Hat
Black Hat
YouTube Video
  • A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full of secret instructions and hardware bugs. In this talk, we'll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. Full Abstract:https://www.blackhat.com/us-17/brief...

Black Hat
Black Hat
YouTube Video
  • Attackers, administrators and many legitimate products rely on PowerShell for their core functionality. However, being a Windows-signed binary native on Windows 7 and later that enables reflective injection of binaries and DLLs and memory-resident execution of remotely hosted scripts, has made it increasingly attractive for attackers and commodity malware authors alike. In environments where Power...

Black Hat
Black Hat
YouTube Video
  • Best of Black Hat USA 2017 Briefings Winner by Harold Chun & Norman Barbosa How did the Feds catch the notorious Russian computer hacker Roman Seleznev - the person responsible for over 400 point of sale hacks and at least $169 million in credit card fraud? What challenges did the government face piecing together the international trail of electronic evidence that he left? How was Seleznev loca...

Black Hat
Black Hat
YouTube Video
  • You’ve probably seen the data: The number of women in the security industry has plateaued for several years now at about 11%, and minorities represent less than 12% of the workforce, in an industry that continues to struggle to fill empty positions. The good news is that there are now real-world programs and initiatives under way in the industry and by employers to recruit and retain more women, m...

Black Hat
Black Hat
YouTube Video
  • by Moritz Lipp & Clémentine Maurice In the last years, mobile devices and smartphones have become the most important personal computing platform. Besides phone calls and managing the personal address book, they are also used to approve bank transfers and digitally sign official documents, thus storing very sensitive secrets. Their exposure or misappropriation would not only be a fatal infringem...

Black Hat
Black Hat
YouTube Video
  • by Scott Tenaglia & Joe Tanen In 2013 and 2014 several high profile vulnerabilities were found in Belkin's WeMo line of home automation devices. Belkin not only patched most of those vulnerabilities, but also maintains a very regular update cycle, which makes them one of the more responsive players in the IoT space. Therefore, we thought it would be interesting to revisit this line of IoT produ...

Black Hat
Black Hat
YouTube Video
  • by Masarah Paquet-Clouston & Olivier Bilodeau Want to give your blog a push or your "gun show" more views? Then why not buy 50,000 fake followers for $1,000! Click farms from down South or botnets such as Game over Zeus will be more than happy to supply them for you. For this talk, a criminologist and a security researcher teamed up to hunt a large-scale botnet dubbed Linux/Moose 2.0 that condu...

Black Hat
Black Hat
YouTube Video
  • by Michael Schwarz & Anders Fogh In this talk, we will present our research into how the design of DRAM common to all computers and many other devices makes these computers and devices insecure. Since our attack methodology targets the DRAM, it is mostly independent of software flaws, operating system, virtualization technology and even CPU. The attack is based on the presence of a row buffer i...

Black Hat
Black Hat
YouTube Video
  • by Jonathan Brossard With this presentation, we take a new approach to reverse engineering. Instead of attempting to decompile code, we seek to undo the work of the linker and produce relocatable files, the typical output of a compiler. The main benefit of the later technique over the former being that it does work. Once achieved universal code 'reuse' by relinking those relocatable objects as ar...

Black Hat
Black Hat
YouTube Video
  • by Zinaida Benenson Messages containing links to malware-infected websites represent a serious threat. Despite the numerous user education efforts, people still click on suspicious links and attachments, and their motivations for clicking or not clicking remain hidden. We argue that knowing how people reason about their clicking behavior can help the defenders in devising more effective protectio...

Black Hat
Black Hat
YouTube Video
  • by Matt Wolff & Brian Wallace & Xuan Zhao Machine learning techniques have been gaining significant traction in a variety of industries in recent years, and the security industry is no exception to it's influence. These techniques, when applied correctly, can help assist in many data driven tasks to provide interesting insights and decision recommendations to analyst. While these techniques c...

Black Hat
Black Hat
YouTube Video
  • by Alvaro Munoz & Oleksandr Mirosh JNDI (Java Naming and Directory Interface) is a Java API that allows clients to discover and look up data and objects via a name. These objects can be stored in different naming or directory services such as RMI, CORBA, LDAP, or DNS. This talk will present a new type of vulnerability named "JNDI Reference Injection" found on malware samples attacking Java App...

Black Hat
Black Hat
YouTube Video
  • By Saumil Shah "Today's attacks succeed because the defense is reactive.” As the defenses have caught up and closed open doors, we attackers have looked for new avenues and vectors. Looking back on the state of defenses from One-Way Web Hacking in 2001 to Stegosploit in 2016, a common pattern emerges. Defense boils down to reacting to new attacks and then playing catch-up. It is time to transit...

Black Hat
Black Hat
YouTube Video
  • By Thomas Dullien / Halvar Flake In IT security, offensive problems are technical - but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk ("Rearchitecting a defendable internet") I discussed what technical measur...

Black Hat
Black Hat
YouTube Video

New YouTube videos detected.

  • ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy

    by Moritz Lipp & Clémentine Maurice In the last years, mobile devices and smartphones have become the most important personal computing platform. Besides phone calls and managing the personal address book, they are also used to approve bank transfers and digitally sign official documents, thus storing very sensitive secrets. Their exposure or misappropriation would not only be a fatal infringem...

  • Breaking BHAD: Abusing Belkin Home Automation Devices

    by Scott Tenaglia & Joe Tanen In 2013 and 2014 several high profile vulnerabilities were found in Belkin's WeMo line of home automation devices. Belkin not only patched most of those vulnerabilities, but also maintains a very regular update cycle, which makes them one of the more responsive players in the IoT space. Therefore, we thought it would be interesting to revisit this line of IoT produ...

  • EGO MARKET: When People's Greed for Fame Benefits Large-Scale Botnets

    by Masarah Paquet-Clouston & Olivier Bilodeau Want to give your blog a push or your "gun show" more views? Then why not buy 50,000 fake followers for $1,000! Click farms from down South or botnets such as Game over Zeus will be more than happy to supply them for you. For this talk, a criminologist and a security researcher teamed up to hunt a large-scale botnet dubbed Linux/Moose 2.0 that condu...

  • DRAMA: How Your DRAM Becomes a Security Problem

    by Michael Schwarz & Anders Fogh In this talk, we will present our research into how the design of DRAM common to all computers and many other devices makes these computers and devices insecure. Since our attack methodology targets the DRAM, it is mostly independent of software flaws, operating system, virtualization technology and even CPU. The attack is based on the presence of a row buffer i...

  • Witchcraft Compiler Collection: Towards Self Aware Computer Programs

    by Jonathan Brossard With this presentation, we take a new approach to reverse engineering. Instead of attempting to decompile code, we seek to undo the work of the linker and produce relocatable files, the typical output of a compiler. The main benefit of the later technique over the former being that it does work. Once achieved universal code 'reuse' by relinking those relocatable objects as ar...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.