Cameron Camp

Cameron Camp

Security Researcher


Education: CISSP, RHCSA

Highlights of your career? Reverse engineering human brain patterns.

What malware do you hate the most? Nation state sponsored low and slow.

Favorite activities? Building and flying airplanes.

What is your golden rule for cyberspace? Stupid hurts.

When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.

Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.


269 articles by Cameron Camp

Digital Security

Very precisely lost – GPS jamming

Very precisely lost – GPS jamming

Digital Security

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill

Cameron Camp29 Nov 20232 min. read


Digital Security

Fuel for thought: Can a driverless car get arrested?

Fuel for thought: Can a driverless car get arrested?

Digital Security

Fuel for thought: Can a driverless car get arrested?

What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks?

Aryeh Goretsky and Cameron Camp21 Nov 20237 min. read


Cybercrime

Virus Bulletin – building digital armies

Virus Bulletin – building digital armies

Cybercrime

Virus Bulletin – building digital armies

Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack

Cameron Camp11 Oct 20233 min. read


Digital Security

Virus Bulletin PUA – a love letter

Virus Bulletin PUA – a love letter

Digital Security

Virus Bulletin PUA – a love letter

Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors

Cameron Camp10 Oct 20233 min. read


Secure Coding

Can open-source software be secure?

Can open-source software be secure?

Secure Coding

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 20235 min. read


Critical Infrastructure

Black Hat 2023: Hacking the police (at least their radios)

Black Hat 2023: Hacking the police (at least their radios)

Critical Infrastructure

Black Hat 2023: Hacking the police (at least their radios)

Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.

Cameron Camp15 Aug 20232 min. read


Digital Security

Black Hat 2023: AI gets big defender prize money

Black Hat 2023: AI gets big defender prize money

Digital Security

Black Hat 2023: AI gets big defender prize money

Black Hat is big on AI this year, and for a good reason

Cameron Camp14 Aug 20233 min. read


Critical Infrastructure

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Critical Infrastructure

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 20233 min. read


Digital Security

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Digital Security

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 20233 min. read