Items tagged with Black Hat

It was just a few weeks ago when we told you about the SPOILER speculative attack that affects Intel processors, and now we’re learning of a new security exploit that takes advantage of the company’s Visualization of Internal Signals Architecture (VISA). The VISA exploit was detailed to the public at a Black Hat Asia 2019 session entitled Intel VISA: Through the Rabbit Hole. First identified by Maxim Goryachy and Mark Ermolov, this latest vulnerability leverages the VISA logic signal analyzer that is incorporated into the Platform Controller Hub (PCH) found on Intel-based motherboards and in Intel processors. According to the researchers, it is capable of “monitoring... Read more...
Researchers appear to have found serious vulnerabilities in Mac laptops and desktops. Trammell Hudson at Two Sigma Investments and Xeno Kovah at LegbaCore are planning to discuss their discovery in detail at Black Hat USA 2015 in Las Vegas. The crux of their discovery: many of the same firmware vulnerabilities that plague PCs also exist in Macs. The researchers plan to prove the vulnerabilities on August 6th. Image credit: Apple   After discovering the firmware vulnerabilities, the researchers were able to create Thunderstrike 2, a proof-of-concept worm that can infiltrate Macs via their firmware. The worm can move from one laptop to another via your peripherals and (in theory) can spread... Read more...
It doesn't matter what you invent, someone will figure out a way to use it for nefarious purposes. And so it goes with the Internet, a wonderful tool for connecting the world in ways that weren't possible prior to its inception, yet it's also provided a means for cybercriminals to steal large amounts of personal data at a time. Last year was particularly brutal, with several high profile attacks taking place, and this year it looks as though hackers are trying to rise from their underground hideouts and make themselves available for mainstream hire. Hackers List, which opened in November, is one such site. It's a place where any ordinary Joe can go and hire a hacker -- white hat or black hat... Read more...
Of all the hundreds of thousands of computer viruses, trojans, rootkits, and worms that have been written since 'Elk Cloner' first appeared in the wild in 1981, the overwhelming majority of them have targeted computer software. Attacking computer hardware directly isn't impossible now (and wasn't then), but it tends to be extremely difficult to pull off en masse. It is therefore a touch unusual to see security researcher Charlie Miller claiming that Apple batteries represent a security flaw. Miller will present his findings and provide a solution at the upcoming Black Hat conference, which runs from July 30 - August 4 in Las Vegas. General details, however, are -already available. Modern 'smart'... Read more...