The University of South Carolina announced the creation of "SC Cyber,” a consortium of business, academic, and government partners that will train businesses how to beef up cybersecurity and fight cyber crime.
For data security, 2015 is predicted to be as bad or worse as 2014, as more sensitive and confidential information and transactions are moved to the digital space and become vulnerable to attack, according to The Ponemon Institute’s study 2014: A Year of Mega Breaches.
Microsoft has expanded its $100,000 bounty program Monday, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows’ anti-exploit technologies, Computerworld reports.
ATMs hacked to spit out $20s on stage, overriding pacemakers and insulin pumps via laptops – these are just a few of the demonstrations by enterprising hackers at Black Hat, but these presentations often help enterprises more than they hurt.
September 1, 2013
Black Hat, by its name, seems ominous. What was once a conclave of hackers in 1997 has become a fast-growing global conference series focused on the business of cyber security and includes technical presentations on vulnerabilities and solutions.