In his latest bit of odd research, Duo Labs' Mark Loveless takes a closer look at IoT as he pulls apart a wireless drill, bit by bit.
The emergency sirens were activated in Dallas County last Friday night at 11:42pm. First reported as a malfunction, it was later discovered to be a hack - here’s the technical details and why someone may have done it.
Before you head to the 2017 RSA Conference, get some quick survival tips from Mark Loveless of Duo Labs.
Duo Labs researcher Mark Loveless explores the importance of attribution and how it can be helpful if your company is attacked.
Holiday travel tests your personal data security. It’s easier to keep your money, identity and tech safe with tips from Duo’s Senior Security Researcher.
> What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.
Find out more about the latest three vulnerabilities affecting iOS devices, and how many enterprise endpoints and phones are susceptible to these exploits.
A Duo Labs review of the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado and the most interesting security talks on data deduplication, Blockstack, RC4 attacks and causal profiling.
A Duo Labs analysis of the recent critical vulnerability found in Symantec’s Antivirus Decomposer engine, used in Symantec Endpoint Protection and other Symantec and Norton security products, and discovered by Tavis Ormandy.
Bring Your Own Dilemma: OEM Laptops and Windows 10 Security Duo Labs / Featured Article
Security research team, Duo Labs, dissects OEM laptops to find out how secure they are - learn more about the privacy and security issues they found with laptop default settings, data collection and more.
Find out how you can disable your 2FA SMS passcodes to avoid interception by Android trojans and attackers - and use a more secure two-factor authentication method, like Duo Push.
The Glibc Project has announced a critical vulnerability affecting systems using the glibc DNS client-side resolver, that could, under certain conditions, lead to remote code execution on a system using glibc.
The whole Internet of Things (IoT) phenomenon has really gained momentum amongst security professionals as a hot topic of discussion. More than a few people are calling for self-examination...
This is a general guideline aimed at first-time attendees to Black Hat and DEF CON.