SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
The 7 most fascinating research
findings revealed at the Black
Hat security conference
IoT threats — Via a Printer?
A researcher who works at Red Balloon Security
worked with Columbia University to show how
the Internet of Things could be used to steal
data by rapidly turning on and off the outputs
from I/O pins on chips within the printer. The
resulting signal strong enough to pass through
a concrete wall and beyond to a receiver, Ang
Cui said.
Hack First, Shoot Later
Independent security researcher Runa Sandvik
and her husband Michael Augur discussed how
they hacked a Wi-Fi connected TrackingPoint
rifle, misdirecting the targeting system so that
the wrong person might get shot. The effort
took more than a year, though they concluded
the risk of such a hack happening is relatively
low.
Pain at the pump
Trend Micro researchers Kyle Wilhoit and
Stephen Hilt presented findings about how a
honeypot they set up showed the way gas
station pumps could be used to plan DDoS and
other attacks that could bring inventory and
control systems to a standstill. The researchers
suggested that, despite their prevalence, gas
pumps were not recognized as an attack vector
and under-protected as a result.
A Cure for UAF attacks?
Brian Gorenc, manager of vulnerability research
for HP Security Research, showed how isolated
heap memory protection works on Windows
and how objects are located on a system. The
result of his team’s work could be techniques to
reduce use-after-free (UAF) attacks, which
allow hackers to execute arbitrary code and
take over a system.
The Satellite Scenario
Synack security staffer Colby Moore showed
how a data protocol flaw in Globalstar satellite
transmissions means cybercriminals could alter
messages to send pilots, wilderness hikers and
even armoured trucks might be sent off course.
The technique alters the apparent location of
the assets being tracked by Globalstar
equipment.
Trouble At The Wheel
People tend to think it’ll be hard to break
into their car if they keep their keys close,
but ethical hackers Charlie Miller, a security
researcher at Twitter, and Chris Valasek,
director of vehicle security research at
IOActive, provided an inside look at how
wireless signals could be hijacked to not
only access vehicles remotely but
completely control them.
Home, Smart (But Dangerous) Home
The short-wave wireless communication
standard has become a promising way to turn
Internet of Things (IoT) dreams into a reality,
but researchers at Cognosec outlined an
unsecure initial key transport that would make
it possible to compromise ZigBee networks and
take control of all connected devices, such
motion sensors, light switches or door locks.

Mais conteúdo relacionado

Destaque

Memoria de actividades 2013
Memoria de actividades 2013Memoria de actividades 2013
Memoria de actividades 2013INVATTUR
 
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...MŠMT IPN KREDO
 
Enabling Cancer Immunotherapy: From Discovery to Combinations
Enabling Cancer Immunotherapy: From Discovery to CombinationsEnabling Cancer Immunotherapy: From Discovery to Combinations
Enabling Cancer Immunotherapy: From Discovery to CombinationsDiscoverX Corporation
 
Measure Target Cancer Cell Death in Co-Cultures
Measure Target Cancer Cell Death in Co-CulturesMeasure Target Cancer Cell Death in Co-Cultures
Measure Target Cancer Cell Death in Co-CulturesDiscoverX Corporation
 
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...BIOCOMCRO
 
Reem_Elshourbagy Project portofolio
Reem_Elshourbagy Project portofolioReem_Elshourbagy Project portofolio
Reem_Elshourbagy Project portofolioReem El-shourbagy
 
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...jespadill
 

Destaque (11)

Memoria de actividades 2013
Memoria de actividades 2013Memoria de actividades 2013
Memoria de actividades 2013
 
Yoryos
YoryosYoryos
Yoryos
 
Creating Accessible Experiences
Creating Accessible ExperiencesCreating Accessible Experiences
Creating Accessible Experiences
 
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...
Financování vysokého školství ve světě: mezinárodní zkušenosti, inspirace a t...
 
Enabling Cancer Immunotherapy: From Discovery to Combinations
Enabling Cancer Immunotherapy: From Discovery to CombinationsEnabling Cancer Immunotherapy: From Discovery to Combinations
Enabling Cancer Immunotherapy: From Discovery to Combinations
 
Effortless Checkout
Effortless CheckoutEffortless Checkout
Effortless Checkout
 
Measure Target Cancer Cell Death in Co-Cultures
Measure Target Cancer Cell Death in Co-CulturesMeasure Target Cancer Cell Death in Co-Cultures
Measure Target Cancer Cell Death in Co-Cultures
 
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...
Presentation by MicroConstants at BIOCOM CRO event May 2013: Virtual Drug Dev...
 
Reem_Elshourbagy Project portofolio
Reem_Elshourbagy Project portofolioReem_Elshourbagy Project portofolio
Reem_Elshourbagy Project portofolio
 
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...
Lección 2 | Intermediarios | La influencia de la familia | Escuela Sabática M...
 
Hemp Biz Summit Keynote Address
Hemp Biz Summit Keynote AddressHemp Biz Summit Keynote Address
Hemp Biz Summit Keynote Address
 

Mais de itworldcanada

The top 7 ethical dilemmas reported by IT
The top 7 ethical dilemmas reported by ITThe top 7 ethical dilemmas reported by IT
The top 7 ethical dilemmas reported by ITitworldcanada
 
LinuxCon 2015: A recap in 8 images
LinuxCon 2015: A recap in 8 imagesLinuxCon 2015: A recap in 8 images
LinuxCon 2015: A recap in 8 imagesitworldcanada
 
V mworld 2015 keynotes recapped in pictures
V mworld 2015 keynotes recapped in picturesV mworld 2015 keynotes recapped in pictures
V mworld 2015 keynotes recapped in picturesitworldcanada
 
Technicity: the connected city photo highlights
Technicity: the connected city photo highlightsTechnicity: the connected city photo highlights
Technicity: the connected city photo highlightsitworldcanada
 
Doodles on cloud, security and big data
Doodles on cloud, security and big dataDoodles on cloud, security and big data
Doodles on cloud, security and big dataitworldcanada
 
Canada’s best tech companies to work for in
Canada’s best tech companies to work for inCanada’s best tech companies to work for in
Canada’s best tech companies to work for initworldcanada
 

Mais de itworldcanada (6)

The top 7 ethical dilemmas reported by IT
The top 7 ethical dilemmas reported by ITThe top 7 ethical dilemmas reported by IT
The top 7 ethical dilemmas reported by IT
 
LinuxCon 2015: A recap in 8 images
LinuxCon 2015: A recap in 8 imagesLinuxCon 2015: A recap in 8 images
LinuxCon 2015: A recap in 8 images
 
V mworld 2015 keynotes recapped in pictures
V mworld 2015 keynotes recapped in picturesV mworld 2015 keynotes recapped in pictures
V mworld 2015 keynotes recapped in pictures
 
Technicity: the connected city photo highlights
Technicity: the connected city photo highlightsTechnicity: the connected city photo highlights
Technicity: the connected city photo highlights
 
Doodles on cloud, security and big data
Doodles on cloud, security and big dataDoodles on cloud, security and big data
Doodles on cloud, security and big data
 
Canada’s best tech companies to work for in
Canada’s best tech companies to work for inCanada’s best tech companies to work for in
Canada’s best tech companies to work for in
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

The 7 most fascinating research findings revealed at the Black Hat security conference

  • 1. The 7 most fascinating research findings revealed at the Black Hat security conference
  • 2. IoT threats — Via a Printer? A researcher who works at Red Balloon Security worked with Columbia University to show how the Internet of Things could be used to steal data by rapidly turning on and off the outputs from I/O pins on chips within the printer. The resulting signal strong enough to pass through a concrete wall and beyond to a receiver, Ang Cui said.
  • 3. Hack First, Shoot Later Independent security researcher Runa Sandvik and her husband Michael Augur discussed how they hacked a Wi-Fi connected TrackingPoint rifle, misdirecting the targeting system so that the wrong person might get shot. The effort took more than a year, though they concluded the risk of such a hack happening is relatively low.
  • 4. Pain at the pump Trend Micro researchers Kyle Wilhoit and Stephen Hilt presented findings about how a honeypot they set up showed the way gas station pumps could be used to plan DDoS and other attacks that could bring inventory and control systems to a standstill. The researchers suggested that, despite their prevalence, gas pumps were not recognized as an attack vector and under-protected as a result.
  • 5. A Cure for UAF attacks? Brian Gorenc, manager of vulnerability research for HP Security Research, showed how isolated heap memory protection works on Windows and how objects are located on a system. The result of his team’s work could be techniques to reduce use-after-free (UAF) attacks, which allow hackers to execute arbitrary code and take over a system.
  • 6. The Satellite Scenario Synack security staffer Colby Moore showed how a data protocol flaw in Globalstar satellite transmissions means cybercriminals could alter messages to send pilots, wilderness hikers and even armoured trucks might be sent off course. The technique alters the apparent location of the assets being tracked by Globalstar equipment.
  • 7. Trouble At The Wheel People tend to think it’ll be hard to break into their car if they keep their keys close, but ethical hackers Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of vehicle security research at IOActive, provided an inside look at how wireless signals could be hijacked to not only access vehicles remotely but completely control them.
  • 8. Home, Smart (But Dangerous) Home The short-wave wireless communication standard has become a promising way to turn Internet of Things (IoT) dreams into a reality, but researchers at Cognosec outlined an unsecure initial key transport that would make it possible to compromise ZigBee networks and take control of all connected devices, such motion sensors, light switches or door locks.