Skip to main content

HITB

Engineer fined for blogging exactly how to hack a hotel's Wi-Fi

posted onSeptember 28, 2018
by l33tdawg
Credit: Flickr

It's one thing to report website vulnerabilities before they're used maliciously. It's another to blog about a vulnerability online.

Singapore authorities fined Zheng Dutao, an engineer at Chinese internet giant Tencent, S$5,000 (about $3,660) this week after discovering he hacked into a hotel's Wi-Fi system and shared sensitive information on his blog, ZDNet reported Tuesday.

Call for Tools for All-New HITB Armory at HITBSecConf2018 - Dubai Now Open

posted onSeptember 12, 2018
by l33tdawg
Credit: ToolsWatch

We’re pleased to announce the first ever HackInTheBox Armory! The HITB Armory is where you can showcase your security tools to the world. You will get 30 minutes to present your tools onstage, and an exhibit area to conduct demonstrations for up 3 hours per day! The event is organized by HITB in collaboration with ToolsWatch and Opposing Force.

Security researcher highlights macOS remote exploit w/ custom URL schemes

posted onSeptember 4, 2018
by l33tdawg
Credit: 9 to 5 Mac

Security researchers look at how macOS users can be remotely targeted using document handlers and custom URL schemes – which is behind the “Do you want to allow” popup seen in the above screenshot.

Patrick Wardle explains how a custom APT abuses URL schemes to remotely infect macOS targets

Hackers Are Exposing An Apple Mac Weakness In Middle East Espionage

posted onSeptember 3, 2018
by l33tdawg
Credit: Forbes

Apple Macs are rarely the target of digital espionage. But in recent years, a mysterious hacker crew called WindShift has targeted specific individuals working in government departments and critical infrastructure across the Middle East. And they’re exploiting weaknesses believed to affect all Apple Mac models.

Hacker Unlocks 'God Mode' and Shares the 'Key'

posted onAugust 14, 2018
by l33tdawg
Credit: HITBGSEC

L33tdawg: Christopher will also be at #HITBGSEC Singapore at the end of August.

When a room filled with hundreds of security professionals erupts into applause, it's notable. When that happens less than five minutes into a presentation, it's remarkable. But that's what transpired when security researcher Christopher Domas last week showed a room at Black Hat USA how to break the so-called ring-privilege model of modern CPU security.

Facebook's Alex Stamos called for huge changes to solve the company’s problems in a leaked memo

posted onJuly 24, 2018
by l33tdawg

L33tdawg: We are proud to have Alex keynoting for us next year at #HITB2019AMS! Our 10th year anniversary HITB Security Conference in Amsterdam!

Alex Stamos, Facebook’s head of security, called for radical overhaul in how Facebook operates in a leaked memo from March 2018, as the company reeled from a chain of ugly scandals.

China Has Some Of The Best Hackers In The World. Its Government Wants To Keep Them There.

posted onJune 5, 2018
by l33tdawg

L33tdawg: See you guys at HITBSecConf2018 - Beijing on November 1st and 2nd :)

At first glance, you couldn’t see much of a difference between DEF CON, the notoriously rowdy American hacker conference, and its newly formed franchise in Beijing, where in May China hosted its first hacker conference.

Your logo and branded vulnerability aren't helping: How to disclose better

posted onMay 27, 2018
by l33tdawg

In 2000, I leapt out of journalism and in to security communications. I was relocating to the San Francisco Bay Area and, despite the downturn, tech was king. I also wanted to lend my unique albeit non-technical skill set to a technology that protected people or, at the very least, attempted to reduce harm caused by malicious behavior.