Tag: conferences

A flaw in the WPA-2 wireless protocol leaves millions of device vulnerable to hacking and other malicious acts.

Update: Flaw in widely used Wi-Fi Standard could allow snooping

Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections.  (Updated to add commentary by Bob Rudis of Rapid 7.)

Fancy Bear? More like Senator Bedfellow, says Bev Harris of Black Box Voting

It’s the Corruption, Stupid: why Russians aren’t the biggest threat to Election Security

In-brief: Russian hackers aren’t the biggest threat to the security and integrity of elections says Bev Harris of Black Box Voting. Instead, it’s a more common enemy: run of the mill political corruption, mostly at the local level. Also: Eric Hodge of CyberScout talks about the challenges of helping states secure their election systems. Problem number one: recalcitrant voting machine makers. 

FBI agents arrested researcher Marcus Hutchins in Las Vegas Wednesday in connection to the Kronos Banking Trojan.

Hero WannaCry Researcher Charged over Links to Kronos Trojan

In-brief: A British researcher who became a hero after he stopped the WannaCry ransomware from spreading globally has been apprehended in Nevada and charged with distributing the Kronos banking trojan in the U.S. between July 2014 and July 2015.

At BlackHat: Hell is Other People’s Machine Learning

At BlackHat: Hell is Other People’s Machine Learning

In-brief: Machine learning is all the rage in the information security industry. But a study by Endgame and University of Virginia suggests that it may be vulnerable to manipulation by sophisticated AI-driven tools.

Podcast: Michael Daniel on Cyber Diplomacy in the Age of Trump

Podcast: Michael Daniel on Cyber Diplomacy in the Age of Trump

In-brief: In an interview with The Security Ledger, former Obama Cybersecurity Advisor Michael Daniel weighs in on the changing US-Israel relationship, promoting cyber security talent in the U.S. and the future of the intelligence community’s ‘vulnerability equities’ program.