enigma logo
IntroCommitteeSponsorsProgramAbout
TwitterFacebookGoogle+YouTube
Get Info

General Stories

  • Hotel Hosting Security Conference Was the Victim of a Data Breach (SF Chronicle, 1.28.16)
  • Enigma Security Conference Confronts End-point Security, False Positives (SD Times, 1.29.16)
  • From Hacked Pacemakers to Cyber-attacked Dissidents, Enigma Conference Offers a Fresh Look at Security (PC Magazine, 1.28.16)

Dana DeBeauvoir on "We Need Something Better-Building Star Vote"

  • Internet Voting Is Just Too Hackable, Says Security Experts (USA Today, 1.28.16)

Stefan Savage on "Modern Automotive Vulnerabilities: Causes, Disclosures, and Outcomes"

  • Security Experts Say That Hacking Cars Is Easy (Fortune, 1.26.16)
  • Your Future Self-driving Car Will Be Way More Hackable (MIT Technology Review, 1.26.16)
  • Not the Same Old Song (SC Magazine, 2.1.16)
  • Stop the Music! Booby-trapped Song Carjacked Vehicles - Security Prof (The Register, 1.26.16)
  • Ever Been So Sick of a Song You Considered Veering Off the Road to Make It Stop? (PC Paper, 1.27.16)
  • Car Hacking: Software in a Song Can Be Used to Control Modern Vehicles (Inquistr, 1.27.16)
  • Carjacking Your Vehicle Is as Easy as Playing a Song in It for 18 Seconds! (TechFrang, 1.29.16)

Rob Joyce on "Disrupting Nation State Hackers"

  • Head of NSA's Elite Hacking Unit: How We Hack (ABC News, 1.28.16)
  • NSA Hacker: “We'll Poke and We'll Poke and We'll Wait and Wait” (SF Chronicle, 1.28.16)
  • NSA's ‘hacker in Chief' Offers Cyberprotection Advice (Government Technology, 1.29.16)
  • Head of NSA's Hacker Squad Explains How to Armor Networks Against the Likes of Him (Boing Boing, 1.29.16)
  • NSA Hacker Chief Explains How to Keep Him Out of Your System (Wired, 1.28.16)
  • Address IoT Security Risks Before It Is Too Late, Urges Report (ComputerWeekly, 1.28.16)
  • How to Make Your Own NSA Bulk Surveillance System (Wired, 1.27.16)
  • NSA Hacking Chief: Internet of Things Security Keeps Me Up at Night (MIT Technology Review, 1.27.160
  • NSA Gives Advice on Defending Against Nation-state Attackers. (eWeek, 2.1.16)
  • Defending a Network From NSA (ComputerWorld, 2.1.16)
  • NSA Explains How to Protect Yourself From the NDA (IT Pro Portal, 2.1.16)
  • NSA Top Hacker: Here's How to Make My Life Hard (Fortune, 1.29.16)
  • Data Sheet (Fortune, 1.30.16)
  • NSA's Chief Hacker Explains How to Keep the NSA Out of Your Business (BGR, 1.29.16)
  • Top NSA Hacker Explains How to Protect Yourself Against the NSA (Breibart, 1.29.16)
  • NSA Chief Hacker Explains How to Harden Defenses Against His Elite Attack Dogs (Hot Hardware, 1.30.16)
  • NSA's Top Hacking Boss Explains How to Protect Your Network From His Attack Squads (The Register, 1.28.16)
  • Zero-day Exploits Aren't as Important to the NSA as You Think (Engadget, 1.29.16)
  • NSA's Hacker-in-chief: We Don't Need Zero-days to Get Inside Your Network (Motherboard, 1.29.16)
  • Cops Hate Encryption but the NSA Loves It When You Use PGP (The Register, 1.27.16)
  • NSA TAO Chief Talks Nation State Hacks at USENIX Enigma Conference (Open DNS Blog, 2.4.16)
  • NSA's Lead Hacker Offers Security Tips (Beta News, 2.4.16)
  • NSA's Chief Hacker Gave a Remarkable Talk on What You're Doing Wrong Online (Tech Insider, 2.2.16)

Adrienne Porter Felt on "Why Is Usable Security Hard, and What Should We Do About It?"

  • Google Will Soon Shame All Websites That Are Unencrypted (Motherboard, 1.27.16)
  • USENIX Enigma 2016 — Why Is Usable Security Hard, and What Should We Do About It? (Lifeboat, 1.29.16)
  • 5 Non-health Tech Stories You Should Care About This Week (MedCity News, 1.29.16)
  • Chrome Will Soon Mark Unencrypted Sites With a Big, Red X (Digital Trends, 1.28.16)
  • Google Chrome to Call Out Unencrypted Websites (Bit-Tech, 1.29.16)
  • Google Chrome Moves Toward Full HTTPS (Inverse, 1.27.16)
  • Google Chrome Gets Ready to Mark All HTTP Sites as “bad” (ZDNet, 1.28.16)

Trustworthy Computing

  • Facebook CSO Slams RSA Conf for Repping ‘the Worst Parts of the Security Industry' (The Register, 1.27.16)
  • Terrible Infections, Bad Practices, Unclean Kit — welcome to Hospital IT (The Register, 1.26.16)
  • If You Can't Buy Bootleg Gear Online in New York, This May Be Why (The Register, 1.26.16)

Nicholas Weaver on "The Golden Age of Bulk Surveillance"

  • Pssst, You PGP Is Leaking (Motherboard, 1.27.16)

Damon McCoy on "Bullet-Proof Credit Card Processing"

  • Payments Trail Reveals Illicit Underground Economy (SF Chronicle, 1.29.16)
  • Spam Trail Leads to China's Three Largest Banks (MIT Technology Review, 1.29.16)