DEF CON 26 — Thiago Alves — Hacking PLCs and Causing Havoc on Critical Infrastructures
Programmable Logic Controllers (PLCs) are devices used on a variety of industrial plants, from small factories to critical infrastructures like…Подробнее
Programmable Logic Controllers (PLCs) are devices used on a variety of industrial plants, from small factories to critical infrastructures like…Подробнее
Why does my bank’s website require my MFA token but Quicken sync does not? How is using Quicken or any…Подробнее
Recently, the inspection of huge traffic log is imposing a great burden on security analysts. Unfortunately, there have been few…Подробнее
We all protect our home networks, but how safe is your data once it leaves on its journey to the…Подробнее
With «Trust none over the Internet» mindset, securing all communication between a client and a server with protocols such as…Подробнее
Barcodes and barcode scanners are ubiquitous in many industries and work with untrusted data on labels, boxes, and even phone…Подробнее
Software is increasingly used to make huge decisions about people’s lives and often these decisions are made with little transparency…Подробнее
Practice shows that even the most secure software written by the best engineers contain bugs. Malware is not an exception.…Подробнее
Existing techniques for bypassing wired port security are limited to attacking 802.1x-2004, which does not provide encryption or the ability…Подробнее
Two years ago Richard Thieme spoke on “Playing Through the Pain: The Impact of Dark Knowledge on Security and Intelligence…Подробнее
We propose a new exploit technique that brings a whole-new attack surface to defeat path normalization, which is complicated in…Подробнее
Regarding ptmalloc2, many heap exploitation techniques have been invented in the recent years, well documented on the famous how2heap repository,…Подробнее
Most people are familiar with homograph attacks due to phishing or other attack campaigns using Internationalized Domain Names with look-alike…Подробнее
In the past, when hackers did malicious program code injection, they used to adopt RunPE, AtomBombing, cross-process creation threads, and…Подробнее
Sniffing and attacking Bluetooth Low Energy devices has always been a real pain. Proprietary tools do the job but cannot…Подробнее
Though many security mechanisms are deployed in Apple’s macOS and iOS systems, some old-fashioned or poor-quality kernel code still leaves…Подробнее
Surveillance had been a fact of life for sex workers wherever they have faced prohibition. Only two elements, communication and…Подробнее
Orwell’s concept of 1984 has more to do with government misuse of technology than technology itself. New technology allows for…Подробнее
In the ever raging battle between malicious code and anti-malware tools, firewalls play an essential role. Many a malware has…Подробнее
Wireless sensor networks are commonly thought of as IoT devices communicating using familiar short-range wireless protocols like Zigbee, MiWi, Thread…Подробнее
Defenders have been slowly adapting to the new reality: Any organization is a target. They bought boxes that blink and…Подробнее
The Teddy Ruxpin is an iconic toy from the 1980’s featuring an animatronic teddy bear that reads stories from cassette…Подробнее
Complexity is increasing. Trust eroding. In the wake of Spectre and Meltdown, when it seems that things cannot get any…Подробнее
In a world of high volume malware and limited researchers we need a dramatic improvement in our ability to process…Подробнее
Cellular networks are connected with each other through a worldwide private, but not unaccessible network, called IPX network. Through this…Подробнее
These days it’s hard to find a business that doesn’t accept faster payments. Mobile Point of Sales (mPOS) terminals have…Подробнее
Most of us have knowledge of PCB construction. In the past reversing someone’s design was an easy task due to…Подробнее
Mobile phones are quite complicated and feature multiple embedded processors handling wifi, cellular connectivity, bluetooth, and other signal processing in…Подробнее
Fair elections are at the core of every democracy and are of paramount importance to our national security. The confidence…Подробнее