Follow Tweet This Facebook LinkedIn

Main menu

Skip to secondary content
Menu
  • Tech News
    • Last 48 Hours
    • Analytics
    • Artificial Intelligence
    • Careers
    • Cloud
    • Digital Transformation
    • Ecommerce
    • Education
    • Emerging Tech
    • Infrastructure
    • IT Workplace
    • Leadership
    • Managed Services & Outsourcing
    • Marketing
    • Mobility
    • Opinion
    • Privacy & Security
    • Public Sector
    • Software
    • Wireless & IoT
    • Women in Technology
    • Work from home
  • Resources
    • Reports and Whitepapers
    • News for CIOs
    • CIO Census
    • Digital Security Zone
    • Webinar Highlight Reports
    • Roundtable Highlight Reports
    • 2020 IT Salary Calculator
    • AI Directory
    • ITWC Talks
    • Featured Partner Content Hubs
    • Digital Magazines
    • Blogs
  • Events
    • Canada’s Top Women in Fintech/Blockchain
    • CANADA’S TOP WOMEN IN CYBERSECURITY
    • CIO OF THE YEAR
    • MapleSEC
    • UPCOMING EVENTS
    • FLAGSHIP EVENTS
    • VIrtual Events
    • Webinars
    • Roundtables
    • All IT World Canada Events
  • Videos
    • President to President
    • All Tech Videos
  • Podcasts
    • Cyber Security Today
    • #Hashtag Trending
    • Leadership in the Digital Enterprise
    • CMO Talks
    • ITWC Podcast Network
  • Engage
    • Blogger Opportunities
    • 2020 Vision
    • Gartner Corner
    • About Us
    • Privacy Policy
    • Contact Us
  • Subscribe
#TRENDING
  • Analytics
  • Technicity
  • Women in Tech
  • MapleSEC
  • Work from home
  • Morning Briefing
  • Leadership

OUCH! Free Content gets hurt by enabled Ad Blockers

Please consider unblocking us or Subscribe in support of our great non-gated content.
Privacy & Security

Black Hat Las Vegas

IT World Canada Staff
IT World Canada Staff
@itworldca
Published: August 14th, 2013


Key exploit

Mozilla software developer Cody Brocious demonstrated a homebrewed device made for US$50 that unlocks electronic hotel room doors secured with key cards. However, Brocious’s device works only on locks made by Onity, and it works about 33 per cent of the time.

Counterfeit eyes

Think iris scanning is secure? Researchers from a university in Madrid showed how they could create a lifelike image of the iris of a person’s eye. In tests against a top commercial recognition system, the iris scanner was fooled 80 per cent of the time. Images of fake irises have been created in the past, but this is the first time the iris of an actual person has been duplicated from data gathered about the organ.

Evading the Bouncer

When Google introduced Bouncer to its online app store, GooglePlay, it was believed the technology would go a long way toward cleaning up apps there infected with malware. But Trustwave demonstrated how, through the use of sophisticated masking techniques, it was able to slip a pernicious app under Bouncer’s radar and remain camped in GooglePlay for two weeks before the researchers took it down.

A trojan in the cards

A pair of researchers demonstrated a payment card they designed that can infect a point of payment terminal when it was swiped by the device. The card planted on the terminal a Trojan that collected credit card information and PIN numbers entered into the device. That information could be later extracted from the terminal with another malicious card.

Tap-and-hack

Near Field Communications (also called tap-and-pay) was shown to be vulnerable by Accuvant researcher Charlie Miller, who demonstrated how a tag embedded with an NFC chip could be used to compromise the information in an Android phone simply by brushing against it.

Dubious achievement

Finally, among the Pwnie Awards for dubious achievement went to the unknown creators of the Flame software who developed a scheme that used Windows Update to deliver malware to PCs. The authors of Flame did not accept their award when it was announced.

Tweet This Facebook LinkedIn google+
Privacy & Security hackers, security
Technology News Gallery Week of May 7
Wireless Growth by the Numbers

About IT World Canada Staff
IT World Canada Staff

The online resource for Canadian Information Technology professionals.

Follow Follow @itworldca on Twitter Facebook Join IT World Canada Staff on LinkedIn IT World Canada Staff on Gooogle+ Website

Related Content

Layers the best cybersecurity approach in 2021

Sponsored By: Microsoft

Investment and audit key for security in 2021

Canadian Civil Liberties Association says facial recognition tech in Canada should be suspended

Sponsored By: Ricoh

Security incident forces firm to consider its MSP options

Tweets by itworldca

Follow
Tweet This Facebook LinkedIn google+

Subscribe
Resources CanadianCIO Digital Security CMO Digital CDN Magazine IT Salary Calculator LightningPR Webinars and Events Tech Research Partner Content
IT World Canada Community About Us Contact Us Technology Videos IT News IT Blogs Mobility News Cloud Computing Technology Topics ITWC Talks
ITWC Websites ITWC.ca Channel Daily News.com IT World Canada.com IT Business.ca Direction Informatique.com
© 2021 IT World Canada