Follow Tweet This Facebook LinkedIn

Main menu

Skip to secondary content
Menu
  • Tech News
    • Last 48 Hours
    • Analytics
    • Artificial Intelligence
    • Careers
    • Cloud
    • Digital Transformation
    • Ecommerce
    • Education
    • Emerging Tech
    • Infrastructure
    • IT Workplace
    • Leadership
    • Managed Services & Outsourcing
    • Marketing
    • Mobility
    • Opinion
    • Privacy & Security
    • Public Sector
    • Software
    • Wireless & IoT
    • Women in Technology
    • Work from home
  • Resources
    • Reports and Whitepapers
    • News for CIOs
    • CIO Census
    • Digital Security Zone
    • Webinar Highlight Reports
    • Roundtable Highlight Reports
    • 2020 IT Salary Calculator
    • AI Directory
    • ITWC Talks
    • Featured Partner Content Hubs
    • Digital Magazines
    • Blogs
  • Events
    • CANADA’S TOP WOMEN IN CYBERSECURITY
    • CIO OF THE YEAR
    • MapleSEC
    • UPCOMING EVENTS
    • FLAGSHIP EVENTS
    • VIrtual Events
    • Webinars
    • Roundtables
    • All IT World Canada Events
  • Videos
    • President to President
    • All Tech Videos
  • Podcasts
    • Cyber Security Today
    • #Hashtag Trending
    • CMO Talks
    • ITWC Podcast Network
  • Engage
    • Blogger Opportunities
    • 2020 Vision
    • Gartner Corner
    • About Us
    • Privacy Policy
    • Contact Us
  • Subscribe
#TRENDING
  • Analytics
  • Women in Tech
  • MapleSEC
  • Work from home
  • Morning Briefing
  • Cloud
  • Technicity WEST

OUCH! Free Content gets hurt by enabled Ad Blockers

Please consider unblocking us or Subscribe in support of our great non-gated content.
Privacy & Security

The 7 most fascinating research findings revealed at the Black Hat security conference

Shane Schick
Shane Schick
@ShaneSchick
Published: August 10th, 2015
  • IoT threats — Via a Printer?

    Screen Shot 2015-08-07 at 4.01.25 PM

    A researcher who works at Red Balloon Security worked with Columbia University to show how the Internet of Things could be used to steal data by rapidly turning on and off the outputs from I/O pins on chips within the printer. The resulting signal strong enough to pass through a concrete wall and beyond to a receiver, Ang Cui said.

    (Image: Network World)

  • Hack First, Shoot Later

    Screen Shot 2015-08-07 at 4.04.51 PM

    Independent security researcher Runa Sandvik and her husband Michael Augur discussed how they hacked a Wi-Fi connected TrackingPoint rifle, misdirecting the targeting system so that the wrong person might get shot. The effort took more than a year, though they concluded the risk of such a hack happening is relatively low.

    (Image: Twitter)

  • Pain at the pump

    Screen Shot 2015-08-07 at 4.11.05 PM

    Trend Micro researchers Kyle Wilhoit and Stephen Hilt presented findings about how a honeypot they set up showed the way  gas station pumps could be used to plan DDoS and other attacks that could bring inventory and control systems to a standstill. The researchers suggested that, despite their prevalence, gas pumps were not recognized as an attack vector and under-protected as a result.

    (Image: Twitter)

  • A Cure for UAF attacks?

    Screen Shot 2015-08-07 at 4.20.58 PM

    Brian Gorenc, manager of vulnerability research for HP Security Research, showed how isolated heap memory protection works on Windows and how objects are located on a system. The result of his team’s work could be techniques to reduce use-after-free (UAF) attacks, which allow hackers to execute arbitrary code and take over a system.

    (Image: BlackHat.com)

  • The Satellite Scenario

    Screen Shot 2015-08-07 at 4.28.32 PM

    Synack security staffer Colby Moore showed how a data protocol flaw in Globalstar satellite transmissions means cybercriminals could alter messages to send pilots, wilderness hikers and even armoured trucks might be sent off course. The technique alters the apparent location of the assets being tracked by Globalstar equipment.

    (Image: GlobalStar)

  • Trouble At The Wheel

    Screen Shot 2015-08-07 at 10.34.13 PM

    People tend to think it’ll be hard to break into their car if they keep their keys close, but ethical hackers Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of vehicle security research at IOActive, provided an inside look at how wireless signals could be hijacked to not only access vehicles remotely but completely control them.

    (Image: Huffington Post)

  • Home, Smart (But Dangerous) Home

    Screen Shot 2015-08-07 at 10.38.49 PM

    The short-wave wireless communication standard has become a promising way to turn Internet of Things (IoT) dreams into a reality, but researchers at Cognosec outlined an unsecure initial key transport that would make it possible to compromise ZigBee networks and take control of all connected devices, such motion sensors, light switches or door locks.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

 

Tweet This Facebook LinkedIn google+
Privacy & Security Black Hat
10 Summer songs IT departments should be streaming right now
7 Things launched at Samsung Unpacked 2015 that IT departments should have noticed

About Shane Schick
Shane Schick

Your guide to the ongoing story of how technology is changing the world

Follow Follow @ShaneSchick on Twitter Join Shane Schick on LinkedIn Shane Schick on Gooogle+ Website

Related Content

BlackBerry announces new ransomware recovery tool

Black Hat/Def Con roundup: How Google ups Android security, another Microsoft SMB vulnerability

Black Hat roundup: Facebook CSO sounds off, and another warning on a social media scam

Poorly secured smart home devices and wearables are a potential launch pad for cyber threats

Tweets by itworldca

Follow
Tweet This Facebook LinkedIn google+

Subscribe
Resources CanadianCIO Digital Security CMO Digital CDN Magazine IT Salary Calculator LightningPR Webinars and Events Tech Research Partner Content
IT World Canada Community About Us Contact Us Technology Videos IT News IT Blogs Mobility News Cloud Computing Technology Topics ITWC Talks
ITWC Websites ITWC.ca Channel Daily News.com IT World Canada.com IT Business.ca Direction Informatique.com
© 2021 IT World Canada