Security conference talks fall into two categories
* we designed a distributed entropy siphon to perform a black-box hypervisor side channel escape and chain-load a persistent rootkit into the CPU cache
* we looked behind the sofa and found an entire industry of products/services that have made no attempt at security at all and are therefore vulnerable to the most basic issues that we've been finding in everything for the past 30 years, and no-one else had bothered to look.
@richardstephens And while those conferences happen, users with little training continue to click on links that they receive via email on HTML emails.
@maryjane @richardstephens and organisations keep demanding that employees/customers click on dodgy looking but actually legit links in emails

@exu0

Also, my comment about "untrained users" was not a criticism of end users. No one is an expert on everything. Training is needed.

@richardstephens