How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
This session outlines how someone with Autism Spectrum Disorder (ASD) offers a unique skillset that can be very helpful in…Подробнее
This session outlines how someone with Autism Spectrum Disorder (ASD) offers a unique skillset that can be very helpful in…Подробнее
In addition to discussing newly discovered pre-auth attacks against multiple smart city devices from different categories of smart city technology,…Подробнее
Although vulnerabilities stemming from the deserialization of untrusted data have been understood for many years, unsafe deserialization continues to be…Подробнее
This briefing will describe some resources that can help smaller organizations create an effective SDL program. It will also outline…Подробнее
In this talk, we describe DeepLocker, a novel class of highly targeted and evasive attacks powered by artificial intelligence (AI).…Подробнее
In 2014, we took to the stage and presented «A Wake-up Call for SATCOM Security,» during which we described several…Подробнее
Speak with any Fortune 500 running mainframe and they’ll tell you two things: (1) without their mainframes they’d be out…Подробнее
In this presentation, we will explain the inner workings of this technology and showcase the new capability that was developed…Подробнее
Back with another year of soul crushing statistics, the Black Hat NOC team will be sharing all of the data…Подробнее
Social engineering is a big problem but very little progress has been made in stopping it, aside from the detection…Подробнее
Deep learning can help automate the signal analysis process in power side channel analysis. So far, power side channel analysis…Подробнее
SirenJack is a vulnerability that was found to affect radio-controlled emergency warning siren systems from ATI Systems. It allows a…Подробнее
Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device,…Подробнее
The wisdom on why it is difficult to recruit and retain women in the industry has changed over the past…Подробнее
Organizations have been forced to adapt to the new reality: Anyone can be targeted and many can be compromised. This…Подробнее
The Namecoin and Emercoin blockchains were designed to provide decentralized and takedown-resistant domain names to users with the reported goal…Подробнее
This talk broadly addresses the range of connections between Mafias, organised crime, and cybercrime. But, it focuses this discussion on…Подробнее
The number of logic attacks on ATMs continues to rise. Some of them involve a «black box,» a device that…Подробнее
The state of VPN protocols is not pretty, with popular options, such as IPsec and OpenVPN, being overwhelmingly complex, with…Подробнее
Healthcare infosec is in critical condition- too few bodies, underfunded to a fault, and limping along on legacy systems stuffed…Подробнее
This presentation looks at the real world process of the BlackBerry Product Security team. In partnership with product owners, developers,…Подробнее
This talk discusses the realities of corruption, with real-life anecdotes from interviews conducted with real criminals and victims. This talk…Подробнее
This presentation demonstrates such limitations with examples showing how the blindspot limits AFL’s ability to find bugs, and how it…Подробнее
In ARM there are certain instructions that generates exception. Such instructions are typically executed to request a service from software…Подробнее
OpenPGP and S/MIME are the two prime standards for providing end-to-end security for emails. From today’s viewpoint this is surprising…Подробнее
In this talk, I will speak to my own story of PTSD – from military service in Afghanistan to a…Подробнее
When incidents of sexual harassment or sexual assault occur within communities, as we’ve recently seen in InfoSec, how can a…Подробнее
Recent advancements in OS security from Microsoft such as PatchGuard, Driver Signature Enforcement, and SecureBoot have helped curtail once-widespread commodity…Подробнее
In this talk, I place ROSE within the context of other false personae activities – trolling, sockpuppetry, bots, catfishing, and…Подробнее
In this talk, we will analyze the «zero trust» approach in several threat scenarios to determine its true effectiveness. This…Подробнее