July and August often produce some intriguing and unusual computer security research.
We’ve already written about BlackHat and DEFCON. Here’s something from the USENIX HotSec wor
July and August often produce some intriguing and unusual computer security research.
We’ve already written about BlackHat and DEFCON. Here’s something from the USENIX HotSec wor