Highlights from DEFCON 26 - CF047

Highlights from DEFCON 26 - CF047

0 0 circa un anno fa
45 Ascolti 5 Download
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two factor authentication on common technology platforms -- and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss ... Maggiori informazioni

Seguici su Facebook

iAB member
Copyright 2019 - Spreaker Inc. a Voxnest Company - Crea un podcast - New York, NY
Aiuto