Know Your Adversary: A Live Hack using stolen digital weapons
When NSA’s digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. What do these tools mean for the average user? How can they protect themselves? This talk aims to educate the audience by providing a history of these ...
When NSA’s digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. What do these tools mean for the average user? How can they protect themselves? This talk aims to educate the audience by providing a history of these digital weapons, a demonstration of how they are used, and a demonstration a LIVE HACK of a virtual environment. We will show the ease in which these digital weapons can be downloaded and used by a novice user to infiltrate even the most secure networks, and we will provide users with a better understanding of how they can secure their company systems against these and future attacks.