Skip to main content [aditude-amp id="stickyleaderboard" targeting='{"env":"staging","page_type":"article","post_id":202599,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,security,","session":"A"}']

Roundup: A week of hacker news from Black Hat and Defcon

Roundup: A week of hacker news from Black Hat and Defcon

There were plenty of headlines this week about the lack of security in our various computer networks, from mobile phones to social networks. Here’s a roundup of the week’s news about security technology from the hacker conferences Black Hat and Defcon in Las Vegas.

The most controversial story we ran was about an Android wallpaper app that takes your personal info and transfers it to a site in China. We had to correct the info about the data that the wallpaper app used, but it sparked a larger discussion about how app makers often don’t properly disclose what personal data they are using.

[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":202599,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,security,","session":"A"}']

Charlie Miller gives a talk on “How North Korea could build a cyber army to defeat the U.S.” The tongue-in-cheek presentation is pretty frightening.

Ethical hacker Chris Paget shows how he can intercept cell phone calls (video).

AI Weekly

The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.

Included with VentureBeat Insider and VentureBeat VIP memberships.

Paget also tries to demonstrate how to read radio identification (RFID) tags from a long distance.

A reformed hacker reveals “my life as a spyware developer.”

Hacking the Nintendo Wii and the DS to spread malware.

Workers are easily tricked into revealing company secrets to social engineers.

A security buff hacks automated teller machines and then explains how he did so (videos).

How to build and beat a lie detector.

[aditude-amp id="medium1" targeting='{"env":"staging","page_type":"article","post_id":202599,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,security,","session":"A"}']

Facebook’s former chief security officer says military and commercial cyber defense should be united.

You will be billed $90,000 for this hacked cell phone call.

Project Carmen Sandiego can build a “white pages of mobile phones” and track your location.

How to hide yourself from Google and mobile carriers.

[aditude-amp id="medium2" targeting='{"env":"staging","page_type":"article","post_id":202599,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,security,","session":"A"}']

Digital fingerprints could give away the identity of virus writers. Greg Hoglund finds that patterns in virus-writing tools and other software can leave a trail for investigators.

Seven security experts get the key to reboot the internet in case of catastrophe.

A researcher shows how to bring down local GSM cell sites.

The Department of Homeland Security wants to tame the Wild West of cyberspace.

[aditude-amp id="medium3" targeting='{"env":"staging","page_type":"article","post_id":202599,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,security,","session":"A"}']

Red Lambda raises $10 million for grid-based security.

Solera Networks raises $15 million for real-time forensics.

Your mobile app is spying on you. Lookout examined 100,000 mobile apps and found that many of the programs access your personal data.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More