9 Technologies Security Researchers Will Break At Black Hat

, July 29, 2013 This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.
  • E-mail

Medical Devices

Two years ago, researcher Jay Radcliffe made waves when he demonstrated to Black Hat audiences how he could remotely hack the same type of insulin pump he depends on as a diabetic and remotely turn it off without the permission of a potential patient. That helped spur a number of research efforts by other security testers throughout the community, including Barnaby Jack of IOActive, who last year refined Radcliffe's work and showed a wireless device he created that could scan an area of 300 feet around it to take over those pumps and potentially dispense fatal doses of insulin to a victim.

Sadly, Jack, passed away suddenly, just days before he could reprise his talk with another one showing how it is possible to remotely take over implanted pacemaker devices. His talk will be replaced with a memorial, but IOActive CEO Jennifer Stephens said the company will eventually work to ensure Jack's work helps strengthen medical device security in the long run. Meanwhile, Radcliffe will return to Black Hat to give a case study to researchers on how to work with the FDA to disclose future vulnerabilities they may find in medical devices.

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.