Def Con 25, Las Vegas, NV –
Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is an issue on the network and they need your assistance to troubleshoot. The person is calm, friendly and helpful so you agree to assist. By the time it is all done you have in advertently given away vital information about your network to a potential attacker.
DEF CON 24 - Las Vegas, NV
The term Honey Pot is one that most people are very aware of. It is a form of detection that is designed to lure an attacker into targeting a simulated system so that you can identify their techniques and tools. Honey pots have been used to gather intelligence about bot nets, malware in the wild and many other forms of malicious activity. The problem now is that these simulated systems are very easy to identify and avoid by today’s advanced attackers.
Before DEF CON 22 started we published an article that the EFF (Electronic Frontier Foundation) was going to host a very interesting competition called SOHOplessly broken. This competition was to features a large array of common SOHO (small office home office) routers and put them to the security test. As you might imagine the competition revealed that security is not the primary focus of this segment of the market. In all a total of 15 zero day vulnerabilities were uncovered during the competition in four common routers.
DEF CON 22, Las Vegas, NV 2014 – If you have ever stayed in a top end hotel you might find an iPad or similar tablet that allows you to control various functions of the room. This is becoming a more and more common practice in hotels where the guest experience is being moved from the phone or standard TV to movable and WiFi enabled devices. The problem is that there are potential flaws in the system that could allow someone to compromise the system and take control of multiple systems in the room.
DEF CON 22, Las Vegas, NV 2014 - Over the past year or so there have been several discoveries in the aviation industry that have had security researchers and regular people very concerned. We have covered a couple of these that have hit including a claim that a plane can be attacked through its inflight WiFi system and also a very recent one that claims to have found hard coded root credentials in the firmware of some satellite communication equipment. The aviation industry has been quick to refute these claims (and with good reason), but the question still persists: are air craft vulnerable to remote hacking?
We are on the ground in Las Vegas, NV to cover Black Hat and DEF CON 2014. We will be bringing you coverage of the latest in hacks, exploits and the tools that are supposed to protect you from the “bad guys”. We also brought along some fun toys that are perfect to travel security. Granted nothing we brought it going to keep you 100% safe, but in the real world every little bit helps.
A common feature in today’s society is the cat. We see them all over the internet and when we chose to go outside we see them in our neighborhoods. What would happen if someone mobilized that arm of felines to do their bidding? I am not talking about mind control or a real army of cats here. Instead I am talking about simply outfitting some of these animals to collect WiFi data and report back. Think this is crazy? Well if someone can do it with a Google Street view car, why not with an animal as small and inconspicuous as a cat.