THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS by Lance James
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0 by Balint Seeber
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT by Jesus Molina
Black Hat's July Webcast features previews from some of the hottest talks that will be presented at Black Hat USA 2014. Register now for this free Black Hat Webcast and get an exclusive sneak peak of the latest research that will be presented August 6th & 7th at the Mandalay Bay Convention Center in Las Vegas. Each panelist will be given 10 minutes to highlight key takeaways from their upcoming conference session. Webcast registrants can also participate in a live Q&A session with the panelists to discover even more details.
For those of you attending Black Hat USA this summer, you'll get a first look at three brand new Briefings from the speakers themselves. If you're looking to learn more about the show (and what you might be missing), this is a great opportunity to preview the cutting edge security research that makes Black Hat the most relevant information security conference in the world.
Check out the three Talks which were handpicked by the Black Hat Team for this year's installment of the "Black Hat USA Preview" online event:
PREVIEW 1: THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS… READ MORE
Presenter: Lance James
PREVIEW 2: HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0… READ MORE
Presenter: Balint Seeber
PREVIEW 3: LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT... READ MORE
Presenter: Jesus Molina
Sponsor Presentation:
Negative Consequences: Don't Ignore the most overlooked attack vector or your protection.
Whether your business is oil and gas, electrical, chemical, pharmaceutical, healthcare or financial, one of the most overlooked and easiest attack vectors for business disruption and intellectual property theft is both the endpoint (Laptop, Smartphone, Tablet) and critical elements of Industrial Controls (like PLCs, SCADA and other elements).
The world is recognizing that endpoint and embedded alert and protection solutions are woefully inadequate. As new devices come ‘online' the challenges of device type, version control, patching, access rights become huge holes for attackers. Many IT personnel are giving up on the endpoint security due to its low efficacy.
However new, proactive protection approaches are supplanting traditional models. These include math and machine learning, virtualization and containerization. The key is to understand what can actually detect advanced threats and take action to block them from ever initiating. Cylance has produced a game changing approach to detecting and preventing advanced threats.