As the world's dependence on technology continues to increase, the need for collaboration on defensive projects is becoming more acute, as well.
Two researchers have developed a model that can detect bot accounts on Twitter at a massive scale and with a high degree of accuracy.
An overview of tracking ransomware payments, tools to fight ransomware attacks, 3D printing security concerns and more from Black Hat 2017 and DEF CON 25 talks this year.
Get insights into how to assess security hardware, including experimentations in counterfeiting U2F authentication tokens, different weaknesses in the hardware components of encrypted USB keys and more.
Learn about the complexities of conducting security science and phishing tests - the psychological dynamics, validity of security usability studies, ethical issues, hallway testing and more.