7 talks you don't want to miss at Black Hat 2014

“Cybersecurity as realpolitik”

“Cybersecurity as realpolitik”

With the internet comes access to power. This cryptic session discusses both cyber order and cyber safety, which might never exist. – 9:00 a.m., Aug. 6, Mandalay Bay Ballroom
“Cellular exploitation on a global scale: The rise and fall of the control protocol”

“Cellular exploitation on a global scale: The rise and fall of the control protocol”

Not all smart phone users are aware that some phones come with multiple control layers, which could open devices up to exploitation. This talk discusses open source tools to protect devices and the control layers' intricate workings. – 10:15 a.m., Aug. 6, Lagoon K
“Pulling back the curtain on airport security: Can a weapon get past TSA?”

“Pulling back the curtain on airport security: Can a weapon get past TSA?”

Airport security is more than an annoying reality; it's a carefully planned system that uses advanced technology to identify potential threats and weapons. This session looks at the system's inner-workings and vulnerabilities. – 3:00 p.m., Aug. 6, Lagoon K
“How smartcard payment systems fail”

“How smartcard payment systems fail”

EMV chips are already widely used in Europe and beginning to be implemented in the U.S. Although they might be slightly less susceptible to attack, they aren't completely secure. This session delves into smartcards' vulnerabilities and how they can still be frauded. – 9:00 a.m., Aug. 7, South Seas F
“’Nobody is listening to your phone calls.’ Really? A debate and discussion on the NSA’s activities”

“’Nobody is listening to your phone calls.’ Really? A debate and discussion on the NSA’s activities”

The National Security Agency spies on Americans' online video game chats and records their phone calls. Or does it? In this session, a legislative analyst and adjunct professor of law will debate the program's merits and drawbacks. – 2:15 p.m., Aug. 7, South Seas F
“The state of incident response”

“The state of incident response”

In the wake of breaches, incident responses are more important than ever. This session assesses how economic and psychological factors affect a response plan. – 2:15 p.m., Aug. 7, Mandalay Bay D
”SAP, credit cards, and the bird that talks too much”

”SAP, credit cards, and the bird that talks too much”

SAP applications help some of the world's largest organizations run, but certain exploits could manipulate and put important financial information at risk. – 3:30 p.m., Aug. 7, South Seas F

This year's conference hits on various timely issues, including smartcards, the National Security Agency (NSA) and incident response plans.

More Slideshows

Topics:

You must be a registered member of SC Media US to post a comment.