IoT threats — Via a Printer?

Screen Shot 2015-08-07 at 4.01.25 PM

A researcher who works at Red Balloon Security worked with Columbia University to show how the Internet of Things could be used to steal data by rapidly turning on and off the outputs from I/O pins on chips within the printer. The resulting signal strong enough to pass through a concrete wall and beyond to a receiver, Ang Cui said.

(Image: Network World)

Hack First, Shoot Later

Screen Shot 2015-08-07 at 4.04.51 PM

Independent security researcher Runa Sandvik and her husband Michael Augur discussed how they hacked a Wi-Fi connected TrackingPoint rifle, misdirecting the targeting system so that the wrong person might get shot. The effort took more than a year, though they concluded the risk of such a hack happening is relatively low.

(Image: Twitter)

Pain at the pump

Screen Shot 2015-08-07 at 4.11.05 PM

Trend Micro researchers Kyle Wilhoit and Stephen Hilt presented findings about how a honeypot they set up showed the way  gas station pumps could be used to plan DDoS and other attacks that could bring inventory and control systems to a standstill. The researchers suggested that, despite their prevalence, gas pumps were not recognized as an attack vector and under-protected as a result.

(Image: Twitter)

A Cure for UAF attacks?

Screen Shot 2015-08-07 at 4.20.58 PM

Brian Gorenc, manager of vulnerability research for HP Security Research, showed how isolated heap memory protection works on Windows and how objects are located on a system. The result of his team’s work could be techniques to reduce use-after-free (UAF) attacks, which allow hackers to execute arbitrary code and take over a system.

(Image: BlackHat.com)

The Satellite Scenario

Screen Shot 2015-08-07 at 4.28.32 PM

Synack security staffer Colby Moore showed how a data protocol flaw in Globalstar satellite transmissions means cybercriminals could alter messages to send pilots, wilderness hikers and even armoured trucks might be sent off course. The technique alters the apparent location of the assets being tracked by Globalstar equipment.

(Image: GlobalStar)

Trouble At The Wheel

Screen Shot 2015-08-07 at 10.34.13 PM

People tend to think it’ll be hard to break into their car if they keep their keys close, but ethical hackers Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of vehicle security research at IOActive, provided an inside look at how wireless signals could be hijacked to not only access vehicles remotely but completely control them.

(Image: Huffington Post)

Home, Smart (But Dangerous) Home

Screen Shot 2015-08-07 at 10.38.49 PM

The short-wave wireless communication standard has become a promising way to turn Internet of Things (IoT) dreams into a reality, but researchers at Cognosec outlined an unsecure initial key transport that would make it possible to compromise ZigBee networks and take control of all connected devices, such motion sensors, light switches or door locks.


 

Previous article10 Summer songs IT departments should be streaming right now
Next article7 Things launched at Samsung Unpacked 2015 that IT departments should have noticed
Shane Schick
Your guide to the ongoing story of how technology is changing the world

LEAVE A REPLY

Please enter your comment!
Please enter your name here