Javascript is not enabled.

Javascript must be enabled to use this site. Please enable Javascript in your browser and try again.

Skip to content
Content starts here
CLOSE ×
Search
Leaving AARP.org Website

You are now leaving AARP.org and going to a website that is not operated by AARP. A different privacy policy and terms of service will apply.

3 Lessons From a Hacker Conference That Can Keep You Safe Online

Getting hacked is not inevitable, but human behavior can be the weak link


spinner image a computer is shown with a lock icon on the screen
Photo Collage: AARP; (Source: Getty Images (2))

If you go to Las Vegas for the Black Hat cybersecurity conference, don't bet on spotting people there using burner phones in place of their usual smartphones.

Nor should you plan on seeing attendees anxiously using a burner laptop, stripped of most of its usual apps and data.

spinner image Image Alt Attribute

LIMITED TIME OFFER: Labor Day Sale!

Join AARP for just $9 per year with a 5-year membership and get a FREE Gift!

Join Now

That’s not just because Black Hat, which featured training sessions and briefings in early August, is a professional event that requires work. Security professionals know that despite such high-profile mishaps as July’s CrowdStrike-induced outage, our gadgets have gotten much more secure.

So while longtime attendees can recall when burner devices were common, things have changed.

“It’s not really that way anymore,” Neil Wyler, a network administrator for the conference and the rest of the year a vice president at the security firm Coalfire, said in a panel.

1. Devices have stronger defenses

New computers or the newest smartphones not only will feature speed and storage exceeding their predecessors but also be far more secure. Apple, Google and Microsoft have upgraded their defenses in recent years considerably, to the point where their built-in malware defenses mean you shouldn’t have to pay for third-party anti-malware software.

However, you should enable automatic updates on your devices so they can fight off any problems from outside with quick fixes.

In another Black Hat talk, Natalie Silvanovich, team lead at Google’s Project Zero, explained how that and other initiatives to document vulnerabilities helped push software firms to improve their act. In web browsers, for example, Project Zero and other researchers found so many bugs in Adobe’s once-common Flash browser plug-in that Adobe finally scrapped it — deleting an entire “attack surface.”

Microsoft retired its widely attacked Internet Explorer browser and moved its Edge browser to the same framework as Google’s Chrome. And that yielded further upgrades in software we all use online.

Silvanovich also shared a heartening statistic about how much faster developers fix flaws: When Project Zero started in 2010, its researchers saw vendors patching 14 percent of vulnerabilities within 90 days of the team reporting them. Now it's 97.5 percent. ​

Technology & Wireless

Consumer Cellular

5% off monthly fees and 30% off accessories

See more Technology & Wireless offers >

2. Websites and devices have encryption built in

Web browsers almost always encrypt connections to sites, ensuring that any snoop on the same network knows only the domain names of sites you visit — for instance, aarp.org but not this page’s address.

Google’s statistics from Chrome users who opt to share usage data show that 94 percent of all pages loaded in Chrome for Windows are encrypted against eavesdropping, with shares for Android and macOS even higher. Reputable websites have helped by moving to the hypertext transfer protocol secure (HTTPS) standard, ensuring that URLs, cookies and other sensitive data aren’t able to be monitored, modified or impersonated.

So while using a virtual private network (VPN) service can stop a site from tracking you via your device’s Internet Protocol address, you don’t need a VPN for baseline privacy online.

Similar encryption secures almost all consumers’ email in transit. Other Google stats show that 98 percent of messages sent from Gmail travel encrypted and 99 percent arrive encrypted. Ten years ago, about three-quarters were sent encrypted and less than two-thirds arrived encrypted.

But some older mail systems used in businesses lag behind this, leading to the weird phenomenon of some Black Hat attendees sending messages unencrypted at a hacker conference. In that network panel, Wyler mocked those services’ obsolescence: “It is 2024. You have to try to send an email insecure.”

Macs, PCs, iPhones, iPads and Android devices also now encrypt their storage automatically. Unless somebody knows your passcode or password, someone who finds your device shouldn’t be able to read your data, even if the person dismantles it.

spinner image AARP Membership Card

Join AARP for just $9 per year with a 5-year membership and get a FREE Gift! Get instant access to members-only products and hundreds of discounts, a free second membership, and a subscription to AARP The Magazine. 

3. Human beings remain vulnerable to exploitation

Determined attackers with sufficient resources and time still can do grave damage. One talk explained how to use a laser beam to compromise a computer chip’s security and read data from it, but so many attacks these days target a system easier to circumvent and harder to patch — the human brain.

That’s why pressure to act quickly remains a part of scammers’ repertoire, and verifying information on your own before engaging is still important.

Security experts recognize that their systems can’t demand expert-level caution from users. These days, password managers flag reused passwords and make it easier to change them, and passkeys were developed to thwart phishing sites.

Moxie Marlinspike, the pseudonym of developer Matthew Rosenfeld of the Signal encrypted-messaging app, told attendees in a keynote session that their core task is to manage complexity for their users, not expect them to appreciate that complexity as much as developers might.

In the panel that closed out the conference, Window Snyder, CEO of the security firm Thistle Technologies, offered a concise definition of what the goal should be for consumers: “Clicking on the link should not be a dangerous prospect.”

Unlock Access to AARP Members Edition

Join AARP to Continue

Already a Member?