Star 0

Abstract

Security tools are intrusive. They are privy to user behavior and machine internals; they run as highly privileged processes; they “decide” for us what is good or bad. Gaining control over a security tool is an attacker’s dream come true.
This session will review incidents of backdoors in security tools, tools turned into ad platforms and vulnerabilities revealed within, and will discuss how to adapt.