While working on a larger research project, Duo Labs security researchers found sketchy certificates on a brand-new Dell Inspiron 14 laptop. Read on for more about Superfish 2: eDellRoot Boogaloo.
The whole Internet of Things (IoT) phenomenon has really gained momentum amongst security professionals as a hot topic of discussion. More than a few people are calling for self-examination...
Duo Research and Development team share common themes discussed at Black Hat and DEF CON, from advocating for individualized machine learning models to achieving actionable analysis.
Remote Access Trojans (RATs) have traditionally been known as tools that perform tasks such as installing additional malware or stealing files from an infected computer. They are often bundled with enticing software like free games or system utilities. RATs are nothing new, but their usage and related attack methods have changed recently in interesting ways.
As has often been the case with old technology that stays in use in the modern era, several concrete hacks have been demonstrated against satellite communication technology.
Kyle Lady of Duo Labs covers talks about the human factor — from social engineering to human vulnerability scanning — at DEF CON and Black Hat 2015.
The phrase "deep learning" came up many times during Black Hat 2015. It seems to have quickly risen to prominence, and it certainly merits discussion: the broad field of machine learning and developments in the field have definite potential to help the security field make better sense of the data.
This is a general guideline aimed at first-time attendees to Black Hat and DEF CON.