BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//talk//LKLWWX
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-LKLWWX@pretalx.com
DTSTART;TZID=CET:20260508T094000
DTEND;TZID=CET:20260508T102000
DESCRIPTION:Does end-users spontaneously connect USB sticks fiund in public
  places to their personal or professional computers ? \n\nTo this end\, a 
 controlled experiment was carried out in Luxembourg\, where 250 USB sticks
  were voluntarily “lost”. The results revealed a high success rate\, e
 stimated around 20%\, with the first connection recorded in just a few min
 utes. We believe that these users are acting out of curiosity or altruisti
 c intent\, seeking to identify or restore the owner of the key. \n\nHoweve
 r\, they do not perceive the risks associated with their gesture. The stud
 y highlights the persistence of USB key attacks as an effective intrusion 
 vector\, and underscores the need to make users more aware of the dangers 
 they represent.
DTSTAMP:20260412T024937Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:Spreading malware with USB keys - does it still work ? - Didier Bar
 zin\, Mathieu Vajou
URL:https://pretalx.com/bsidesluxembourg-2026/talk/LKLWWX/
END:VEVENT
END:VCALENDAR
