The 7 most fascinating research findings revealed at the Black Hat security conference

IoT threats — Via a Printer?

Screen Shot 2015-08-07 at 4.01.25 PM

A researcher who works at Red Balloon Security worked with Columbia University to show how the Internet of Things could be used to steal data by rapidly turning on and off the outputs from I/O pins on chips within the printer. The resulting signal strong enough to pass through a concrete wall and beyond to a receiver, Ang Cui said.

(Image: Network World)

Hack First, Shoot Later

Screen Shot 2015-08-07 at 4.04.51 PM

Independent security researcher Runa Sandvik and her husband Michael Augur discussed how they hacked a Wi-Fi connected TrackingPoint rifle, misdirecting the targeting system so that the wrong person might get shot. The effort took more than a year, though they concluded the risk of such a hack happening is relatively low.

(Image: Twitter)

Pain at the pump

Screen Shot 2015-08-07 at 4.11.05 PM

Trend Micro researchers Kyle Wilhoit and Stephen Hilt presented findings about how a honeypot they set up showed the way  gas station pumps could be used to plan DDoS and other attacks that could bring inventory and control systems to a standstill. The researchers suggested that, despite their prevalence, gas pumps were not recognized as an attack vector and under-protected as a result.

(Image: Twitter)

A Cure for UAF attacks?

Screen Shot 2015-08-07 at 4.20.58 PM

Brian Gorenc, manager of vulnerability research for HP Security Research, showed how isolated heap memory protection works on Windows and how objects are located on a system. The result of his team’s work could be techniques to reduce use-after-free (UAF) attacks, which allow hackers to execute arbitrary code and take over a system.

(Image: BlackHat.com)

The Satellite Scenario

Screen Shot 2015-08-07 at 4.28.32 PM

Synack security staffer Colby Moore showed how a data protocol flaw in Globalstar satellite transmissions means cybercriminals could alter messages to send pilots, wilderness hikers and even armoured trucks might be sent off course. The technique alters the apparent location of the assets being tracked by Globalstar equipment.

(Image: GlobalStar)

Trouble At The Wheel

Screen Shot 2015-08-07 at 10.34.13 PM

People tend to think it’ll be hard to break into their car if they keep their keys close, but ethical hackers Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of vehicle security research at IOActive, provided an inside look at how wireless signals could be hijacked to not only access vehicles remotely but completely control them.

(Image: Huffington Post)

Home, Smart (But Dangerous) Home

Screen Shot 2015-08-07 at 10.38.49 PM

The short-wave wireless communication standard has become a promising way to turn Internet of Things (IoT) dreams into a reality, but researchers at Cognosec outlined an unsecure initial key transport that would make it possible to compromise ZigBee networks and take control of all connected devices, such motion sensors, light switches or door locks.


 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Shane Schick
Shane Schickhttp://shaneschick.com
Your guide to the ongoing story of how technology is changing the world

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Slideshows

Top Tech News