A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat event.
Microsoft is launching a new version of the Enhanced Mitigation Experience Toolkit (EMET), which includes new techniques contribute by a BlueHat Prize finalist.
Look closely at that surge protector under your desk. It might be covertly spying on you and your network.
What if iris scans could be faked for real via a simple printed image to fool iris recognition systems?
If there's one myth in the information security field that just won't die, it's that an organization's security posture can be substantially improved by regularly training employees in how not to infect the company.
Nvidia said it is investigating the release of encrypted passwords from its user forums, another significant data breach following recent compromises at Yahoo.
Security experts warn that "active defense" or "strike-back" techniques could escalate the battle with hackers.
Hackers breached Yahoo and exposed more than 450,000 passwords, but Yahoo is to blame for making it easy.
The hackers say they were able to obtain the credentials through an SQL injection, a common attack method that gave Sony so much trouble in 2011.