Survival Guide on Black Hat and Defcon conferences: how to escape from hackers
Among the thousands of security experts who gathered this week at Black Hat , Defcon and Security BSides conferences in Las Vegas, anyone who wants to test the security of nearby laptops, telephones, networks - and even credit cards and RFID cards from hotel rooms will surely be found. . Based on incidents from previous years, conference veterans are fully aware of the reality of hacking and have published some comments on the safe use of electronic devices. Here are the recommendations of the blogger McAfee Joris Evers and Robert Auger in the CGISecurity blog :
Work on a laptop with no valuable information. For greater security - do not take a laptop with you at all.
Put the latest patches on everything - OS, browsers, firewalls, VPN clients, Java
Do not use WiFi, or at least turn off automatic connection to the nearest WiFi point. In the hotel room go online by wire
Do not lose your smartphone. If he has the ability to work on WiFi - disable
Be careful with USB flash drives. Do not use taken on time or received as a gift at conferences. Own flash drive, ever inserted into someone else's computer, after that, too, can not be connected to your computer
The same applies to conference materials downloaded or received on CD. According to the experience of previous events, they can also be infected
Configure your firewall to block all incoming ports, and all connections to outgoing ports must be manually confirmed for each application.
Update antivirus
Block Bluetooth
Use a screen overlay that narrows the width of the view.
Clear browser history and cookies
Do not use mobile phones closer than 300 meters from the conference so as not to collide with a fake cellular base station.
Use RFID blockers for passports, credit cards and hotel keys that may contain an RFID chip