9 Technologies Security Researchers Will Break At Black Hat

, July 29, 2013 This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
  • E-mail

Mobile Devices

Photo Source: Apple

At Black Hat, researchers will present a smorgasbord of new research on how to manipulate mobile devices to do things that their manufacturers never intended. Among the most dramatic findings will be from three researchers with the Georgia Institute of Technology who will show how it is possible to inject malware into iOS devices using maliciously tampered chargers, taking advantage in USB security weaknesses. Android devices won't be left unscathed. Researcher Kevin McNamee from Kindsight Security Labs will demonstrate a new Android SpyPhone software tool that could be maliciously injected into any application on an Android device. The tool would make it possible for remote attackers to track the phone's location, intercept calls, texts and emails, and activate the camera and microphone without detection.


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.