Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
Much of the coverage on ransomware either focuses on how it arrives in a system and the damaging repercussions that comes after. But what happens in between? Here's what happens in the background, before victims see the ransom note.
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
A recent surge in tech support scams show that this particular method of coercion is still thriving. New tactics and avenues of attack deceive people who are more familiar with the traditional techniques. Find out how to spot and manage these scams.