Uploaded on Jan 21, 2011
Speaker: Eric SchmiedlSecurity Researcher
Your stack is smash-proof. Your dumpster is fully alarmed. And your firewall is so secure that it has former Soviet officials green with envy. So why are the developers finding their undocumented features in competitors’ products, or company executives on a constant hunt for leaks and traitors? There’s a whole lot more to doing an end-run around network security than calling up and pretending to be the help desk or hoping someone chucks a service manual in the trash Professional attackers with specific targets have a whole rash of techniques — from using targeted employees to hiding microphones — adopted from the world of espionage, and this talk is all about how they do what they do.