Slideshows


9 Technologies Security Researchers Will Break At Black Hat


July 29, 2013 05:14 PM This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  | Next Page » 
  • E-mail

Physical Security

Sometimes it takes an attacker literally getting his or her hands on a system to compromise information within it --which is why a number of security researchers are shining light on ways the bad guys could potentially break into office buildings, even those protected by key card systems and alarms. In one Black Hat presentation, Fran Brown of security firm Bishop Fox will show how he created a device using a commercially available Arduino circuit board and a key card reader made for parking garages that can steal key card information from door badges as far as three feet away -- a key first step in cloning fraudulent access cards.

Another talk by Brown's colleagues at Bishop Fox, Drew Porter and Stephen Smith, will describe how security researchers were able to create a rogue cell base station in order to intercept signals from one of the most widely used alarm key pads in order to prevent a system from reporting an alert to the authorities and to turn off the audible alarm.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  | Next Page » 

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.