Security Tools: An Attacker’s Dream Come True

  • Wednesday, March 2, 2016 | 10:20 AM – 11:10 AM | North | Room: 130

View all Sessions

Security tools are intrusive. They are privy to user behavior and machine internals; they run as highly privileged processes; they “decide” for us what is good or bad. Gaining control over a security tool is an attacker’s dream come true. This session will review incidents of backdoors in security tools, tools turned into ad platforms and vulnerabilities revealed within, and will discuss how to adapt.


This document was retrieved from on Sun, 18 Aug 2019 21:28:38 -0400.