The Five Most Dangerous New Attack Techniques and How to Counter Them

  Рет қаралды 120,106

RSA Conference

RSA Conference

5 жыл бұрын

Alan Paller, Research Director and Founder, SANS Institute
Heather Mahalik, Director of Forensics Engineering at ManTech and Mobile Forensics Course Director, SANS Institute
Ed Skoudis, Instructor, SANS Institute
Johannes Ullrich, Dean of Research, SANS Technology Institute
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them: the nation’s top expert/teacher on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert/teacher in the US. They also answer audience questions.

Пікірлер: 10
@sent4dc
@sent4dc 5 жыл бұрын
39:10 this is the best advice of the whole talk. So clever. Thank you!
@AlphaOneUK
@AlphaOneUK 5 жыл бұрын
adding a semi-colon at the end is good practice also as some password list use it as end of line.
@AlexanderHFinch-ci6yy
@AlexanderHFinch-ci6yy 5 жыл бұрын
19:50 I'm still surprised that people actually answer "security questions" honestly. Want to make them more secure? Easy: - What's the name of your first pet? - lke5tCa083$smcui932nfaKenCHq3/fsd or something like that. Also, "security questions" are awful.
@HemaDarshiniSelvaraju
@HemaDarshiniSelvaraju 5 жыл бұрын
use password manager and how if the password manager is hacked or open a backdoor ?
@timothyaaron8603
@timothyaaron8603 5 жыл бұрын
run a totally separate network and computer and monitors for your employees to surf the web check Facebook and their phones WiFi they are going to do it anyway behind your back.
@xl000
@xl000 5 жыл бұрын
why are they making certificates for people without a strong verification of their identity, like a smartkey / yubikey or something, or at least some crypto signing
@eddieoconnor4466
@eddieoconnor4466 5 жыл бұрын
Well I have a few methods of preventing infiltration: Change password regularly every 3 months...and use combination phrases / words mixed with numbers and "special characters" Use Linux with SElinux enabled, and set access controls granularly Install and run regularly ClamAV / RKHunter / CHRootkit on all files and sectors Do not keep any device actually running when I'm not using it (locking your PC screen to go eat dinner, or answer the phone etc.) Don't use Apple products Don't use Microsoft products And if all else fails? Just "unplug" for a few months.
@CodeXND
@CodeXND 5 жыл бұрын
my my Johannes has same tone in real life as well
@shaungrace9745
@shaungrace9745 5 жыл бұрын
What if each cloud scans the last 4? (variable so nobody can guess) seconds of connections to see what are linking up with the same send away and bring in information. Only take a terrabyte of RAM per second surely? I'm no hacker but I'd just create two or more windows at home exactly the same, all codes the same, and one is overlapping fake with links to another site What does that do? Think about it, if you leave the fake one(s) open, while the proper says passwords you the hacker typed in are no good, then when the actual owner of the password goes to type in the password, the fake window one will overlap from anywhere in the world and see the real password typed. There'd be a way to to leave the fake window open without the host website knowing anything, maybe it was left open after trying to place in your own password in fake password account holder as well. I cannot do it as know nothing of code but bet someone out there is doing this....?? Simply you'd bring up two windows then change everything in the fake one to match the real window then overlap etc.... Please nobody go and do this. It's important to trust each other and trust each others works online
@williebeamish5879
@williebeamish5879 4 жыл бұрын
Cloning the known status of the target and showing the loop, albeit Oceans 11, is a sure tactic better than the novelty thumb drive drop.
AI: Hacking without Humans How Can Human Brains Be Hacked?
44:12
RSA Conference
Рет қаралды 74 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,5 МЛН
Don't eat centipede 🪱😂
00:19
Nadir Sailov
Рет қаралды 22 МЛН
Joven bailarín noquea a ladrón de un golpe #nmas #shorts
00:17
The Five Most Dangerous New Attack Techniques and How to Counter Them
44:04
A View from the Front Lines of Cybersecurity
20:50
RSA Conference
Рет қаралды 47 М.
A Cloud Security Architecture Workshop
52:00
RSA Conference
Рет қаралды 72 М.
Securing AI: What We’ve Learned and What Comes Next
22:10
RSA Conference
Рет қаралды 5 М.
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
51:12
The Five Most Dangerous New Attack Techniques, and What's Coming Next
44:25
The Fallacy of the "Zero-Trust Network"
44:18
RSA Conference
Рет қаралды 54 М.
Insights from NSA’s Cybersecurity Threat Operations Center
45:21
RSA Conference
Рет қаралды 32 М.
The State of Cybersecurity - Year in Review
21:10
RSA Conference
Рет қаралды 5 М.
CISO Confidential: What Separates The Best From The Rest
22:13
RSA Conference
Рет қаралды 2,2 М.
M4 iPad Pro Impressions: Well This is Awkward
12:51
Marques Brownlee
Рет қаралды 6 МЛН
Apple, как вас уделал Тюменский бренд CaseGuru? Конец удивил #caseguru #кейсгуру #наушники
0:54
CaseGuru / Наушники / Пылесосы / Смарт-часы /
Рет қаралды 4,1 МЛН
ПРОБЛЕМА МЕХАНИЧЕСКИХ КЛАВИАТУР!🤬
0:59