Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Tech Industry

Black Hat DC 2007

By ryan naraine March 1, 2007, 1:29 AM PST

Image
1
of 6

Black Hat DC 2007

David Maynor

David Maynor

Security researchers discuss vulnerabilities in Wi-Fi drivers, RFID proximity cards and weaknesses in hardware-based forensics.

Former SecureWorks researcher provides a live demo of the controversial Wi-Fi driver vulnerability that was patched by Apple last year.

Black Hat DC 2007

Maynor explains his side of story

Maynor explains his side of story

In this slide, Maynor sums up his feelings on the MacBook Wi-Fi hijack controversy.

Black Hat DC 2007

Proof of sharing info with Apple

Proof of sharing info with Apple

David Maynor offers proof that he helped Apple build a Wi-Fi auditing box.

Black Hat DC 2007

Joanna Rutkowska, Jamie Butler

Joanna Rutkowska, Jamie Butler

Rootkit gurus Joanna Rutkowska and Jamie Butler go over the slides after Rutkowska’s presentation.

Black Hat DC 2007

Chris Paget

Chris Paget

IOActive researcher Chris Paget gives a truncated talk on RFID and security. This talk had to be modified in the face of legal pressure from HID Global.

Black Hat DC 2007

A modified slide

A modified slide

One of Chris Paget’s slides that had to be modified to avoid a patent dispute with HID Global.

  • Tech Industry
  • Account Information

    Share with Your Friends

    Black Hat DC 2007

    Your email has been sent

Share: Black Hat DC 2007
Image of ryan naraine
By ryan naraine
  • Account Information

    Contact ryan naraine

    Your message has been sent

  • |
  • See all of ryan's content

TechRepublic Premium

  • TechRepublic Premium

    Identity Theft Protection Policy

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Home Office Deduction Guide and Checklist

    There are rules about what qualifies as a home office, what qualifies as a deductible expense and what method should be used to calculate the deduction assuming those rules and qualifications are met. This guide, and the accompanying checklist, from TechRepublic Premium will help you navigate the twists and turns of those regulations to arrive ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Malware

    Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms from TechRepublic Premium will help you grasp the vocabulary that describes malware and the technology that spawns it. From ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Internet of Things Policy

    The Internet of Things continues making inroads in the business world, so organizations should have a defined IoT structure in place to ensure that data and operations are properly secured. This policy from TechRepublic Premium provides guidelines for the procurement, usage and administration of IoT devices, whether company provided or employee-owned. From the policy: Since ...

    Downloads
    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice