This week, thousands of computer hackers going to Las Vegas to attend the Black Hat and Def Con, two facts about the security and safety information globally famous. Participants will often reveal new findings at two conferences of this, the media is also closely monitored to know that things seemed safe could suddenly turn off "attack" users. Some things have been revealed at the Black Hat and Def Con last year as the hack can tell in a minute via iPhone charger off, access to the system of bank surveillance camera, prisons, military facilities only the manipulation of the "simple", or as the hack ATMs to spit it out without money to your bank account. But this year, why?
Hacker can find out your self-destruct message
Poke Facebook app is the ability to send messages, photos, videos to one or more friends.Message from Poke the recipient will see the display for 10 seconds and then disappear.Snapchat, Wickr app features are similar, and also send text messages that self-destruct message. We thought that this app is safe because it does not save anything, but the reality is not so. Two expert digital examination and Kyle O'Meara Drea London will go on stage at Def Con 2013 to talk about how to read the message seemed to have been deleted. By looking in the phone's memory, test data, as well as ping is sent to the application server, the two men know how to retrieve messages from Poke, Snapchat, Wickr before, during and after messaging users.
Camera GoPro sports camera can be turned into tracking
Imagine the following scene: your GoPro camera attached to his hat to prepare for a trip by motorcycle Donate with friends. This camera means terrible, just beautiful recording, which is small and flexible, both the integrated Wi-Fi. But there is also the possibility that someone is listening to every word that you say through the wireless connection of the machine. Two security researchers Zach Lanier Todd Manning and found not one, but many ways to turn your GoPro a tracking device into a voice, they can also control it remotely. This problem will become more serious in the case of soldiers using GoPro to record their military campaigns, such as this video.
Using computers to hack and create 3D models of door key
Locks Wi-Fi, or smart locks are prey to bad hacker, who would have guessed it., So many people still use traditional locks. But this is also not safe because a hacker group can create 3D models of any keys that are manufactured by Schlage Primus, a company specializing in high security locks of America. All you need is some hacker group series of locks, and when they have, they will come model in 3D, and that is the key to life.
In addition, a group of security experts also make a way to "open, pass or decode" a common locks in seconds. They wait to Def Con announced more details about this.
You could be eavesdropping on phone calls with mobile devices $ 250
Two years ago, the hacker has to know how to listen to the call on the mobile phone runs on GSM only device is priced under $ 1,500. Now, a third-party security adviser has found a way to do the same with phones running CDMA network, and the cost to purchase the equipment for this hack is only $ 300 or less.
On the Black Hat website, this team revealed: "I have a box on the desk and your phone will automatically connect to it when you send or receive calls, text messages, email, web browsing. I own this box. I see all the data passing through it and you did not even know that you are connected to me. " This box is actually a femtocell, a small broadcast stations located in the household to help increase signal coverage and capacity of mobile networks. The box will cost only about $ 250, some phone companies do not even give their customers. When in range of the femtocell, your phone will automatically routing data to go through the box without informing the user.
These tiny computers are recording your every move
Brendan O'Connor, a security expert, has created a system valued at $ 60 includes a sensor mounted around the region or around the city. The system can track almost everything, from phones, tablets, PC. Corresponding signal will be sent to the central database in the monitoring process and then it will be mapped onto a map. Currently, each of the lines carries at least one mobile device, so that the above system can track every step of the way our country. Hear action movies like that. It is known that many of the projects Brendan O'Connor has been funded by the Agency for Research Projects of National Defense (DARPA) of the U.S. government.
Hacker can shut down a power plant
Wireless networks are often used to control power plants, and in fact, it was present in the nuclear power plants, thermal power, hydropower. Two hackers have recently discovered a security flaw in the system equipment manufactured by three wireless automation company leading the world.When successfully exploited the vulnerability, the hacker would have evil intentions may read and write data to the device above the 64km distance only by a radio receiver.
Once you have access to the control system devices, hackers can cause false test results of the sensor, override unauthorized data. This action will result in the plant is not running at full capacity, the voltage can be increased suddenly, and oil to run the generators could be wrong mix ratio. In addition, hackers can simply disable the wireless network and for decommissioning the plant. This attack can leave extremely serious consequences, depending on the size and scale of the plant. It sounds horrible to you, right? Just as the movie Live Free and Die Hard.
Hackers can break into your smart home
Let's start with the Smart TV: Hackers can access this smart TVs to steal personal information, install viruses, hijack your webcam and microphone, while still eating corn and watch movies with his girlfriend without knowing anything. And if you suddenly feel the space suddenly becomes hot, the thermostat can the hacker was then corrected. In the case of continuous flashing lights, automatic door suddenly opened like ghost movies can also interfere with the hacker has your home already. These are just some small examples show that smart appliances are increasingly provide many benefits, but it also comes with the huge security risk.
You may be shocked by the death of his pacemaker
In 2006, in the U.S. alone, approximately 350,000 of the 173,000 pacemaker and defibrillator implanted into the patients. This was also the year that the Department of Food and Drug Administration approved the United States began medical devices have wireless connections.Celebrity hacker Barnaby Jack plans to show the access and take control of medical equipment, the individual with a pacemaker, he can order them up or stops working electrical pulses to the patient in eternity. The hack can be carried out at a distance of 9m. Sadly Jack died suddenly last week, but his findings also still have to make people frightened.
Session presentation at the Black Hat Jack remain unchanged and we will use that time to commemorate the work of his very useful. Before that he was looking for ways to make ATM cash injection out without resorting to any bank account. Jack also discovered errors allowed hack insulin pumps and "assassinate" a remote patient.
Hackers can control your car when you are driving it
The hack and cars is becoming a trend among hackers this year. The security expert can break into your vehicle and control it remotely, they also know how to tweak parameters on the front panel to the steering wheel. More of the situation "as the film" appears here: hackers can disable the brakes, steering wheel controls illegal, suddenly speed up, or empty the fuel tank as the screen is still showing full average. Charlie Miller, a security expert from Twitter, along with Chris Valasek, director of security firm IOActive, recently demonstrated the hack above to view Forbes magazine. Four other groups will also demo the same thing at Def Con.
These are just a few things to take place at the Black Hat and Def Con 2013. Let's wait and see what surprises are appearing again.







0 nhận xét:
Đăng nhận xét