GDPArrrrr: Using Privacy Laws to Steal Identities
By James Pavur
On May 25, 2018 the European Union's General Data Protection Regulation (GDPR) came into effect, bringing with it the most expansive governmental effort to regulate data security and privacy to date. Among the GDPR's many provisions is the "Right of Access," which states that individuals have the right to access their personal data. This provision can be easily abused by social engineers to steal sensitive information that does not belong to them.
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#gdparrrrr-using-privacy-laws-to-steal-identities-14526
Видео GDPArrrrr: Using Privacy Laws to Steal Identities канала Black Hat
On May 25, 2018 the European Union's General Data Protection Regulation (GDPR) came into effect, bringing with it the most expansive governmental effort to regulate data security and privacy to date. Among the GDPR's many provisions is the "Right of Access," which states that individuals have the right to access their personal data. This provision can be easily abused by social engineers to steal sensitive information that does not belong to them.
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#gdparrrrr-using-privacy-laws-to-steal-identities-14526
Видео GDPArrrrr: Using Privacy Laws to Steal Identities канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
CQTools: The New Ultimate Hacking ToolkitInfecting the Enterprise: Abusing Office365+Powershell for Covert C2Defcon 21 - Stalking a City for Fun and Frivolityreductio ad absurdum by Christopher DomasWhy Most Cyber Security Training Fails and What We Can Do About itImplementing the Lessons Learned From a Major Cyber AttackDEF CON 24 - 101 Ways to Brick your HardwareHacking Satellites with $300 Worth of TV GearShieldFS: The Last Word in Ransomware Resilient File SystemsInside a Google data centerTed Myerson: Big data needs big privacyLies and Damn Lies: Getting Past the Hype of Endpoint Security SolutionsInvestigating Malware Using Memory Forensics - A Practical ApproachBlack Hat USA 2013 - Exploiting Network Surveillance Cameras Like a Hollywood HackerHiding Objects from Computer Vision by Exploiting Correlation BiasesDEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a WordApple Scanning Your Photos (How to Disable)Keynote: Lessons From 11 Billion Breached RecordsExploiting Network Printers