Posted on
in Presentations
In this latest installment, we will explore the vulnerability and exploitability of everyday objects in the very fabric of our economy. In usual Hacking Exposed LIVE style we will demonstrate LIVE real-world hacks of these devices and systems and show how simple countermeasures can slow and even stop the likelihood of attack.
Hackers & Threats
endpoint security exploit of vulnerability network security zero day vulnerability authentication
Topic
Hackers & Threats
Subtopic
endpoint security
exploit of vulnerability
network security
zero day vulnerability
authentication
Share With Your Community