Security news that informs and inspires

Archive

7 results for tag Defcon:

The State of Real-Time Threat Detection

An overview of tracking ransomware payments, tools to fight ransomware attacks, 3D printing security concerns and more from Black Hat 2017 and DEF CON 25 talks this year.

Black Hat, Defcon, Ransomware, 3D Printing Security

Dissecting Security Hardware at Black Hat and DEF CON

Get insights into how to assess security hardware, including experimentations in counterfeiting U2F authentication tokens, different weaknesses in the hardware components of encrypted USB keys and more.

USB Security, Token, YubiKey, Black Hat, Defcon

Security Conference OPSEC

Get security conference OPSEC (operational security) tips from a senior security researcher who has seen it all - from trading trust for convenience to unattended personal items, learn how to lock it down when you’re on the road.

OPSEC, Operational Security, Security Conference Tips, Defcon, Black Hat

I, For One, Welcome Our New Algorithmic Overlords

Duo Research and Development team share common themes discussed at Black Hat and DEF CON, from advocating for individualized machine learning models to achieving actionable analysis.

Black Hat, Defcon, Machine Learning, Deep Learning

You Built a Better Mousetrap? They Built Better RATs

Remote Access Trojans (RATs) have traditionally been known as tools that perform tasks such as installing additional malware or stealing files from an infected computer. They are often bundled with enticing software like free games or system utilities. RATs are nothing new, but their usage and related attack methods have changed recently in interesting ways.

Defcon, Data Breaches, Remote Access Attacks, Remote Access Security