Get insights into how to assess security hardware, including experimentations in counterfeiting U2F authentication tokens, different weaknesses in the hardware components of encrypted USB keys and more.
Learn about the complexities of conducting security science and phishing tests - the psychological dynamics, validity of security usability studies, ethical issues, hallway testing and more.
Get security conference OPSEC (operational security) tips from a senior security researcher who has seen it all - from trading trust for convenience to unattended personal items, learn how to lock it down when you’re on the road.
Duo Research and Development team share common themes discussed at Black Hat and DEF CON, from advocating for individualized machine learning models to achieving actionable analysis.
As has often been the case with old technology that stays in use in the modern era, several concrete hacks have been demonstrated against satellite communication technology.