Careers & Certifications

05:14 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

9 Technologies Security Researchers Will Break At Black Hat

This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
Previous
2 of 9
Next


Photo Source: Apple

At Black Hat, researchers will present a smorgasbord of new research on how to manipulate mobile devices to do things that their manufacturers never intended. Among the most dramatic findings will be from three researchers with the Georgia Institute of Technology who will show how it is possible to inject malware into iOS devices using maliciously tampered chargers, taking advantage in USB security weaknesses. Android devices won't be left unscathed. Researcher Kevin McNamee from Kindsight Security Labs will demonstrate a new Android SpyPhone software tool that could be maliciously injected into any application on an Android device. The tool would make it possible for remote attackers to track the phone's location, intercept calls, texts and emails, and activate the camera and microphone without detection.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
2 of 9
Next
Comment  | 
Print  | 
More Insights
Hot Topics
7
Have You Hugged Your Sysadmin Today?
Susan Fogarty, Editor in Chief,  7/25/2014
3
Cisco Certifications Confront Changing Skills Needs
Ethan Banks, Senior Network Architect,  7/30/2014
1
IT Budgets Up In 2015, Hiring Tepid
Robert Mullins 7/25/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed