Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
December 7-10, 2020
Virtual Event
6/27/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

Even the most well-meaning cybersecurity laws and procedures can be subverted by a sufficiently devious mind, and there’s no better place to learn how they do it than Black Hat USA this summer. In fact, there’s a whole Human Factors track at the event that is dedicated to how human decisions affect the security of your organization, and how engineering and technology can help.

GDPArrrrr: Using Privacy Laws to Steal Identities is a good example. It’s a 50-minute Briefing about how the General Data Protection Regulation’s “Right of Access” provision (which gives individuals the right to access their personal data) can be easily abused by social engineers to steal sensitive information.

After a survey of more than 150 companies, a security researcher will demonstrate that organizations willingly provide highly sensitive information in response to GDPR right of access requests with little or no verification of the individual making the request, providing one of the most reliable general phishing attack typologies to date.

In Deconstructing the Phishing Campaigns that Target Gmail Users you’ll get a rare inside look at Gmail telemetry to illuminate the differences between phishing groups in terms of tactics and targets. Then, leveraging insights from the cognitive and neuro-science fields on user's susceptibility and decision-making, you’ll learn why different types of users fall for phishing and how those insights can be used to improve phishing protections.

And don’t miss out on Detecting Deep Fakes with Mice, a fascinating look at how researchers worked to train humans, mice, and machines to detect fake speech in "deep fake" videos, using a “deep fake” data set provided by Google. For machines, you'll look at two approaches based on machine learning: one based on game theory called generative adversarial networks (GAN), and one based on mathematical depth-wise convolutional neural networks (Xception). For biological systems, researchers gathered a broad range of human subjects as well as mice, which don't understand words but respond to the stimulus of sounds, and can be trained to recognize real vs. fake phonetic construction. Come to this Briefing and learn who did best: the mice or the machines!

Further information on these cutting-edge Briefings and many more are available now on the Black Hat USA Briefings page, which is live now with full details on this year's schedule!

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14190
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.
CVE-2020-29074
PUBLISHED: 2020-11-25
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
CVE-2020-14191
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...