All Posts (2226)

Sort by

Securing the “Weakest Link”

Securing the “Weakest Link”

Security professionals often call people “the weakest link.” We claim that they'll always make mistakes, however hard we try, and throw up our hands. But the simple truth is that we can help people do well at a wide varie

Read more…
Views: 73
Comments: 0

The Art of Hacking a Human

The Art of Hacking a Human

This session will review security techniques on how to navigate different personalities using traditional hacking techniques. Determine what “operating system” they are running. What patches are in place? What vulnerabilit

Read more…
Views: 118
Comments: 0

Proactive Measures to Mitigate Insider Threat

Proactive Measures to Mitigate Insider Threat

The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access a

Read more…
Views: 118
Comments: 0

Building an Android Scale Incident Response Process

The Android ecosystem has over one billion active devices from hundreds of OEMs and carrier networks. The Android Security Team will explain how the ecosystem is able to respond quickly and effecti

Read more…
Views: 118
Comments: 0

Finding Triggered Malice in Android Apps

Finding Triggered Malice in Android Apps

Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger

Read more…
Views: 109
Comments: 0

How to Analyze an Android Bot

How to Analyze an Android Bot

This presentation will demonstrate a complete end-to-end analysis of an Android bot. This will include the decompilation and static analysis of bot code and the dynamic analysis of the bot’s behavior in a controlled san

Read more…
Views: 135
Comments: 0

Android Serialization Vulnerabilities Revisited

Android Serialization Vulnerabilities Revisited

This session is about Android Serialization vulnerabilities. We revisit two vulns found in Android (CVE-2014-7911, CVE-2015-3837) which allowed for privilege escalation. We also present vulns found in

Read more…
Views: 106
Comments: 0

Hacking Exposed: The Mac Attack

Hacking Exposed: The Mac Attack

Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically se

Read more…
Views: 107
Comments: 0

Taking Control Of Shadow IT

Your organization is already moving to the cloud; the question is, are you going to blindly follow the movement or will you lead the charge? Your IT security team needs the right tools to gain visibility and understanding into your employees’ use of

Read more…