• While a black hat hacker would take the info in all probability keep coming back to the well for more.

    FORBES: Are Hackers The 21st Century's First Revolutionary Movement?

  • That security flaw was first publicly demonstrated by Cody Brocious, a 24-year-old software developer for Mozilla, at the Black Hat hacker conference in July.

    FORBES: Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins

  • He was just doing his job as a so-called white-hat hacker for AirTight Networks, a manufacturer of wireless intrusion protection hardware and software that was invented in India and brought to market in the U.S. AirTight's chief executive, David King, sends hackers out for unsolicited security assessments.

    FORBES: Magazine Article

  • Teso isn't the first so-called "white hat" hacker to expose what appear to be holes in air-traffic security.

    CNN: Hacker says phone app could hijack plane

  • But those rules still offer a few important rights to fliers, as outlined in this helpful PDF created by a "white-hat" hacker, graduate student and security researcher who goes by the name "Sai" and has made a serious vocation of digging into TSA minutiae.

    FORBES: Security

  • The hacker attack at the Black Hat security conference Thursday took even the most jaded security experts by surprise.

    FORBES: Magazine Article

  • Creating a false base station is one of the tricks that researcher Chris Paget is expected to perform on Saturday in a talk at Defcon, a more hacker-friendly conference that immediately follows Black Hat.

    FORBES: Cell Phone Snooping: Cheaper And Easier Than Ever

  • The inconspicuous lock hacking device is an adaption of one demonstrated at the Black Hat security conference in July by Cody Brocious, a hacker and software developer for Mozilla, who discovered and exploited a vulnerability in Onity locks, a cheap and popular hotel room lock that the company says are used on at least four million hotel rooms worldwide.

    FORBES: Hackers Crack Hotel Room Locks With A Tool Disguised As A Dry Erase Marker

  • The name Dark Patterns itself (what hacker-types might think of as black-hat user experience) names and helps shine a light on a previously murky area.

    FORBES: Connect

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定