Skip to main content
Intro
Committee
Sponsors
Program
About
Get Info
Media Coverage
General Stories
Hotel Hosting Security Conference Was the Victim of a Data Breach
(
SF Chronicle
, 1.28.16)
Enigma Security Conference Confronts End-point Security, False Positives
(
SD Times
, 1.29.16)
From Hacked Pacemakers to Cyber-attacked Dissidents, Enigma Conference Offers a Fresh Look at Security
(
PC Magazine
, 1.28.16)
Dana DeBeauvoir on "We Need Something Better-Building Star Vote"
Internet Voting Is Just Too Hackable, Says Security Experts
(
USA Today
, 1.28.16)
Stefan Savage on "Modern Automotive Vulnerabilities: Causes, Disclosures, and Outcomes"
Security Experts Say That Hacking Cars Is Easy
(
Fortune
, 1.26.16)
Your Future Self-driving Car Will Be Way More Hackable
(
MIT Technology Review
, 1.26.16)
Not the Same Old Song
(
SC Magazine
, 2.1.16)
Stop the Music! Booby-trapped Song Carjacked Vehicles - Security Prof
(
The Register
, 1.26.16)
Ever Been So Sick of a Song You Considered Veering Off the Road to Make It Stop?
(
PC Paper
, 1.27.16)
Car Hacking: Software in a Song Can Be Used to Control Modern Vehicles
(
Inquistr
, 1.27.16)
Carjacking Your Vehicle Is as Easy as Playing a Song in It for 18 Seconds!
(
TechFrang
, 1.29.16)
Rob Joyce on "Disrupting Nation State Hackers"
Head of NSA's Elite Hacking Unit: How We Hack
(
ABC News
, 1.28.16)
NSA Hacker: “We'll Poke and We'll Poke and We'll Wait and Wait”
(
SF Chronicle
, 1.28.16)
NSA's ‘hacker in Chief' Offers Cyberprotection Advice
(
Government Technology
, 1.29.16)
Head of NSA's Hacker Squad Explains How to Armor Networks Against the Likes of Him
(
Boing Boing
, 1.29.16)
NSA Hacker Chief Explains How to Keep Him Out of Your System
(
Wired
, 1.28.16)
Address IoT Security Risks Before It Is Too Late, Urges Report
(
ComputerWeekly
, 1.28.16)
How to Make Your Own NSA Bulk Surveillance System
(
Wired
, 1.27.16)
NSA Hacking Chief: Internet of Things Security Keeps Me Up at Night
(
MIT Technology Review
, 1.27.160
NSA Gives Advice on Defending Against Nation-state Attackers.
(
eWeek
, 2.1.16)
Defending a Network From NSA
(
ComputerWorld
, 2.1.16)
NSA Explains How to Protect Yourself From the NDA
(
IT Pro Portal
, 2.1.16)
NSA Top Hacker: Here's How to Make My Life Hard
(
Fortune
, 1.29.16)
Data Sheet
(
Fortune
, 1.30.16)
NSA's Chief Hacker Explains How to Keep the NSA Out of Your Business
(
BGR
, 1.29.16)
Top NSA Hacker Explains How to Protect Yourself Against the NSA
(
Breibart
, 1.29.16)
NSA Chief Hacker Explains How to Harden Defenses Against His Elite Attack Dogs
(
Hot Hardware
, 1.30.16)
NSA's Top Hacking Boss Explains How to Protect Your Network From His Attack Squads
(
The Register
, 1.28.16)
Zero-day Exploits Aren't as Important to the NSA as You Think
(
Engadget
, 1.29.16)
NSA's Hacker-in-chief: We Don't Need Zero-days to Get Inside Your Network
(
Motherboard
, 1.29.16)
Cops Hate Encryption but the NSA Loves It When You Use PGP
(
The Register
, 1.27.16)
NSA TAO Chief Talks Nation State Hacks at USENIX Enigma Conference
(
Open DNS Blog
, 2.4.16)
NSA's Lead Hacker Offers Security Tips
(
Beta News
, 2.4.16)
NSA's Chief Hacker Gave a Remarkable Talk on What You're Doing Wrong Online
(
Tech Insider
, 2.2.16)
Adrienne Porter Felt on "Why Is Usable Security Hard, and What Should We Do About It?"
Google Will Soon Shame All Websites That Are Unencrypted
(
Motherboard
, 1.27.16)
USENIX Enigma 2016 — Why Is Usable Security Hard, and What Should We Do About It?
(
Lifeboat
, 1.29.16)
5 Non-health Tech Stories You Should Care About This Week
(
MedCity News
, 1.29.16)
Chrome Will Soon Mark Unencrypted Sites With a Big, Red X
(
Digital Trends
, 1.28.16)
Google Chrome to Call Out Unencrypted Websites
(
Bit-Tech
, 1.29.16)
Google Chrome Moves Toward Full HTTPS
(
Inverse
, 1.27.16)
Google Chrome Gets Ready to Mark All HTTP Sites as “bad”
(
ZDNet
, 1.28.16)
Trustworthy Computing
Facebook CSO Slams RSA Conf for Repping ‘the Worst Parts of the Security Industry'
(
The Register
, 1.27.16)
Terrible Infections, Bad Practices, Unclean Kit — welcome to Hospital IT
(
The Register
, 1.26.16)
If You Can't Buy Bootleg Gear Online in New York, This May Be Why
(
The Register
, 1.26.16)
Nicholas Weaver on "The Golden Age of Bulk Surveillance"
Pssst, You PGP Is Leaking
(
Motherboard
, 1.27.16)
Damon McCoy on "Bullet-Proof Credit Card Processing"
Payments Trail Reveals Illicit Underground Economy
(
SF Chronicle
, 1.29.16)
Spam Trail Leads to China's Three Largest Banks
(
MIT Technology Review
, 1.29.16)