Black Hat is a corporate event management and conference company which was established in 1997 by Jeff Moss. It is known for organizing a network of conferences and providing fresh perspectives on security and proprietary information. The company organizes several conferences throughout the world annually; the registration for these conferences is open to the public. Most participants come as an employee of their company and are updated and informed about the latest innovations in terms of safety.
[...] Participants of the conference Attendance at the conference has evolved over the years, reaching to about 3,000 people. The participants include security professionals, engineers, developers, federal agents, vendors and of course even the famous hackers. The conference is supported by companies such as Cisco, Microsoft and Ernst & Young. Microsoft and Cisco perform various security conferences. Microsoft talks about the release of Windows Vista and Internet Explorer 8. The participants belong to numerous companies that participate to improve their safety and knowledge. [...]
[...] Instead of making vague reference to these vulnerabilities, they intend to throw light on the efforts taken by hackers to use the existing weaknesses in the system to break into it. These are demonstrated with real-time examples. It then uses this to give practical advice on security measures to be applied. The Black Hat conference is open to all companies and communities. The purpose of these conferences is to safeguard the security of information which is a factor in survival of businesses and public authorities. A company that has secured its network will be a trusted company for customers thereof. [...]
[...] They find the conference as a platform to reach out to a large audience. Issues with regard to security vulnerabilities and scenarios are largely discussed. Thus, during a session on wireless networks, the public is given inputs on how to penetrate such networks, even protected by encryption systems, using tools that are free and that are readily available on the Internet. A German hacker, known as FX says: "the buffer overflow is the most common flaw that is always present in the case of software, embedded in hardware. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee