Hotel locks, iris scans, GooglePlay and other "secure" technologies are cracked in demonstrations at the security conference.
We need stronger security for mobile devices as we begin to make payments by smartphone, or connect on the go to the company network.
Black Hat security conference: University of Washington creation gives you vicarious thrills of social engineering, lock picking.
A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat event.
Microsoft is launching a new version of the Enhanced Mitigation Experience Toolkit (EMET), which includes new techniques contribute by a BlueHat Prize finalist.
Look closely at that surge protector under your desk. It might be covertly spying on you and your network.
What if iris scans could be faked for real via a simple printed image to fool iris recognition systems?
If there's one myth in the information security field that just won't die, it's that an organization's security posture can be substantially improved by regularly training employees in how not to infect the company.
Nvidia said it is investigating the release of encrypted passwords from its user forums, another significant data breach following recent compromises at Yahoo.