What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.
Duo Labs set out to measure how many Redis instances were exposed to the Internet and potentially vulnerable to attacks. Here is a brief summary of our findings.
Find out more about the latest three vulnerabilities affecting iOS devices, and how many enterprise endpoints and phones are susceptible to these exploits.
We at Duo Labs wanted to know if there is a difference between Nexus phones and other Android phones as it relates to security posture. Here are some of the key findings from our analysis:
A Duo Labs review of the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado and the most interesting security talks on data deduplication, Blockstack, RC4 attacks and causal profiling.