Def con vegas12/31/2023 ![]() ![]() According to Vigo, most major carriers have failed to update the security of their voicemail features and still rely on easily guessable PINs as passwords. Hacker Martin Vigo presented research showing that a vulnerability in voicemail could allow a nefarious actor to access a target’s accounts for online services like PayPal and WhatsApp. He further found that he could infect some of the cameras with malware, which could then spread to other databases and systems in a police department when an officer syncs the device with a computer connected to the network. Mitchell also devised a way to livestream footage from the cameras, potentially allowing a criminal to track a cop’s location and predict upcoming law enforcement actions. With the exception of one device made by Digital Ally, Mitchell was able to remotely download, alter, and then re-upload footage onto the cameras without leaving a trace. On Saturday, a consultant named Josh Mitchell from the cybersecurity firm Nuix reported the results of a test he had conducted on five different body camera models that surveillance companies are marketing to U.S. Voting machine manufacturers and some election officials predictably indicated that they were unimpressed with the results, arguing that the Def Con tests did not accurately simulate all of the security features and time restrictions that a hacker would face at an actual polling place. Plus, the attack is fairly sophisticated and requires access to a target’s Wi-Fi network, so Echo owners who aren’t being hounded by highly trained and dedicated hackers would’ve been safe anyway. However, Echo owners need not fret-the researchers already notified Amazon of their methods, and the company rolled out automatic security updates to the speakers last month. Wired reports that Tencent representatives Wu Huiyu and Qian Wenxiang said that the research team managed to string together multiple bugs in the second-generation Echo that would allow a hacker to remotely stream audio from the device’s microphone. Researchers from the Chinese tech conglomerate Tencent presented the results of a months-long project to devise a way to surreptitiously convert Amazon’s Echo smart speaker into a surveillance device on Sunday. Here are some of the most jaw-dropping device vulnerabilities that hackers revealed at this year’s Def Con. The conference is essentially a cavalcade of terrifying reminders that the technology that we rely on to maintain a somewhat functioning society is not as secure as we think. Future Tense is a partnership of Slate, New America, and Arizona State University that examines emerging technologies, public policy, and society.ĭef Con, one of the most prominent annual hacking conferences in the world, was held in Las Vegas over the weekend. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |