Главная
Study mode:
on
1
Intro
2
Images of people in jail
3
USB hacks
4
Recover stolen devices
5
Customization of malware
6
Connections between devices
7
Data classification
8
Pyramid of data
9
Devices
10
Location
11
WiFi
12
Privacy
13
Stolen Laptop
14
GPS Disabled
15
Serial Number Search
16
Serial Number Bot
17
John Heller
18
Andrew Garbutt
19
Snapchat
20
ThirdParty Libraries
21
Google Maps
22
Outro
Description:
Explore the hidden dangers of personal data exposure in this eye-opening conference talk from OWASP AppSec California 2015. Delve into the world of digital privacy and security as Ken Westin, a seasoned security researcher, reveals how seemingly innocuous information can be exploited by both law enforcement and criminals. Learn about tools and techniques used in real-world cases to track individuals, and discover how data breaches compromise personal information. Gain insights into the interconnectedness of devices, the classification of data, and the potential risks associated with everyday technologies like USB drives, GPS, and third-party libraries. Understand the implications of the "Internet of Things" on privacy and discover strategies businesses can employ to protect their customers' sensitive information.

Privacy and Security Risks in the Internet of Things

OWASP Foundation
Add to list
0:00 / 0:00