Black Hat Daily News -- Powered By Dark Reading
- Follow @BlackHatEvents on Twitter and tweet using hashtag #BHUSA: http://links.covertchannel.blackhat.com/ctt?kn=6&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0
- See all the Black Hat USA pictures on Flickr: http://links.covertchannel.blackhat.com/ctt?kn=13&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0
- Download the Black Hat USA mobile app and customize your event schedule: http://links.covertchannel.blackhat.com/ctt?kn=1&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

Tuesday July 25, 2017

You are receiving this special "Black Hat Daily News" as a courtesy. You will only receive this limited edition newsletter for three days during the Black Hat Conference.

HIGHLIGHTS:
- CISO Summit
- Black Hat Day Zero – NAVIGATING #BHUSA 2017
- Best of Black Hat: 20 Epic Talks in 20 Years
- Majority of Security Pros Let Productivity Trump Security
- Black Hat USA 2017: Attendee Survey Results

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TOP STORIES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
http://links.covertchannel.blackhat.com/ctt?kn=7&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- How Bad Data Alters Machine Learning Results
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
http://links.covertchannel.blackhat.com/ctt?kn=11&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- IoT Physical Attack Exploit to be Revealed at Black Hat
Security researcher Billy Rios plans to demonstrate how an exploit can cause an IoT device to launch a physical attack against a human.
http://links.covertchannel.blackhat.com/ctt?kn=19&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- Researchers Build Firewall to Deflect SS7 Attacks
Security researchers will release an open-source SS7 firewall at Black Hat USA that aims to bolster security of mobile operators' core networks.
http://links.covertchannel.blackhat.com/ctt?kn=20&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- Hacking Factory Robot Arms for Sabotage, Fun & Profit
Black Hat talk will discuss how hackers could take over robotic arms, create micro-defects in products, and open up a new world of subtle blackmail.
http://links.covertchannel.blackhat.com/ctt?kn=14&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
LATEST NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Majority of Security Pros Let Productivity Trump Security
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
http://links.covertchannel.blackhat.com/ctt?kn=10&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- Bots Make Lousy Dates, But Not Cheap Ones
The danger of dating sites: If a beautiful woman asks men to click on malware, they'll probably click.
http://links.covertchannel.blackhat.com/ctt?kn=2&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.
http://links.covertchannel.blackhat.com/ctt?kn=4&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TODAY'S EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- July 25: CISO Summit
http://links.covertchannel.blackhat.com/ctt?kn=15&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- July 25: Black Hat Day Zero: NAVIGATING #BHUSA 2017
http://links.covertchannel.blackhat.com/ctt?kn=16&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

- July 25: Trainings Schedule
http://links.covertchannel.blackhat.com/ctt?kn=5&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RESOURCES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Black Hat USA 2017: Attendee Survey Results
Portrait of an Imminent Cyber Threat offers actionable insights and information on critical industry trends.
http://links.covertchannel.blackhat.com/ctt?kn=17&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0


- 8 Most Overlooked Security Threats
Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
http://links.covertchannel.blackhat.com/ctt?kn=3&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0


- The Impact of a Security Breach 2017
New data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
http://links.covertchannel.blackhat.com/ctt?kn=18&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0

***********************

Black Hat c/o UBM
303 Second St., Suite 900 South Tower, San Francisco, CA 94107

This email was sent to newsletter@newslettercollector.com. Add email@blackhat.messages4.com and blackhat@messages1.blackhat.com to your address book to ensure delivery to your inbox. Please do not reply to this message as responses are not monitored.

UNSUBSCRIBE from Black Hat USA
Link

UNSUBSCRIBE from Black Hat
Link

(C) UBM 2017. All Rights Reserved.

Privacy Policy
http://links.covertchannel.blackhat.com/ctt?kn=12&ms=NTQ1NjA2NDIS1&r=Mjg0MjI4MTk1ODMyS0&b=2&j=MTIwMzkwNzYwOQS2&mt=1&rt=0