Ways You're Get Hacked
Please visit Aaron's editorial sponsor.
A bundle of fun for hackers and triple the trouble for you.
Hacker convention exposes just a few of your vulnerabilities
You should be so lucky.
At two major hacking events this weekend, Black Hat and DEF CON in Las Vegas, hackers will unveil some new security flaws in our everyday technology, even internal technology. Pacemakers, specifically.
The latest hacks:
Here are a few newly surfacing hacks displayed this weekend, in a surreal convention-like setting. Oh, they're also a bundle of fun for hackers and triple the trouble for you:
Surprise! SnapChat not secure
The rise in popularity of so-called "self-destructing" messaging apps, such as SnapChat and Facebook Poke, has Drea London and Kyle O'Meara questioning whether a hacker could get these messages. These companies claim that such messages are erased as soon as read -- not so, London and O'Meara argue that it can still be recovered. Or better yet, the duo says that messages can be retrieved before, after or during transmission.
Lo-Tech locks get high-tech hacks
Some high-tech locks utilizing Bluetooth and Wi-Fi have made their way into markets today, and they're easily hackable. So most people would still feel safe having an old-fashioned lock and key, right? Wrong! A group of MIT students are showing software that can create a model using a 3D printer, when you're given the serial number of a particular key.
Industrial facilities hacked from 40 miles away
Usage of Wi-Fi has become ubiquitous in our connected world. In various industries, wireless sensor networks allow for the monitoring and controlling of environmental conditions, such as temperature, sound or pressure. Lucas Apa and Carlos Mario Penagos will demonstrate attacks that take advantage of key vulnerabilities. Using radio frequency transceivers within a 40-mile range of a facility, a user can hack and modify sensor measurements upon which critical decisions are made. This consequences can be very serious.
As seen on numerous spy flicks and television shows, security cameras connected to the Internet are extremely vulnerable. However, when you consider that these cameras are deployed in thousands of public and private locations such as homes, hospitals and industrial facilities, it becomes less "James Bond" and more frightening. In a demonstration at Black Hat, hackers will demonstrate known vulnerabilities to "freeze and modify legitimate video streams from these cameras."
Smart TVs used as surveillance devices
With over 80 million units sold in 2012, Smart TVs are no doubt becoming the new norm. However, like smartphones and computers, these high-tech glowing boxes are riddled with vulnerabilities, notes Seung Jin Lee. When one considers the fact that many of these televisions have cameras and microphones, it becomes increasingly frightening that so-called "bad guys" can spy remotely without you knowing.
Most people don't realize that the cars they drive have mini-computers on board that dictate everything from braking to even the gas meter. Unfortunately, what this means is hackers could attack your car remotely. As noted by Jason Staggs, it has become increasingly easy for attacks to be staged on your car, allowing for hackers to control critical parts of the vehicle.
Hacking Bionic People
In 2006, the FDA first approved fully wireless pacemakers. As a result, there are currently well over 3 million pacemakers and over 1.7 million Implantable Cardioverter Defibrillators in use. Notorious hacker Barnaby Jack was scheduled to give a speech about security fallacies in these types of bionic technology. Even though he passed away last week, it is important that everyone listen to his findings.
Aaron Stipkovich, Publisher: With an education in information, technology, business and related disciplines, Aaron entered business on radio. Beginning as a disc jockey in Southern California, a nationally syndicated talk show host position soon followed. During the transition from regional to national, he launched a national print magazine in several countries, and was distributed by Time Inc. Having a handful of humble business media entities, a decade or so later he has divested himself from most of his companies... (more...)