A pair of researchers has discovered a flaw in the USB protocol’s basic architecture that allows for malware to be programed into a device’s firmware, making it nearly undetectable and impossible to patch. 359 more words
Tags » Black Hat
“Computer users pass around USB sticks like silicon business cards,” Andy Greenberg reports for Wired. “lthough we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. 263 more words
Car hackers have been busy over the past few years.
They’ve zombified cars in wired mode and even wirelessly, to show how you can screw with windows, toot horns, flip headlights on and off, unexpectedly slam on brakes, and take over electronic smart steering so as to steer cars straight into nearby weedlots. 548 more words
In brief, why is Black Hat sending me an email about “Parties, Schedule, and Swag?” “It wouldn’t be Black Hat without the parties.” C’mon now? DEF CON Parties is entirely separate from the DEF CON conference. 59 more words