DefCon Hackers...
August 2008
Hackers mull physical attacks on a networked world. Hackers at the DefCon conference demonstrated novel techniques for infiltrating facilities. For example, a hacker could ship a hacked iPhone to a nonexistent employee and hope the device sits in the mailroom, scanning for nearby wireless connections in order to break into a computer network in an ultra-secure building. Their talks served as a reminder of the danger of physical attacks as a way to breach hard-to-crack computer networks. As technology gets cheaper and more powerful, from cell phones that act as personal computers to minuscule digital bugging devices, it is enabling a new wave of clever attacks that, if pulled off properly, can be as effective and less risky for thieves than traditional computer-intrusion tactics.
Hackers mull physical attacks on a networked world. Hackers at the DefCon conference demonstrated novel techniques for infiltrating facilities. For example, a hacker could ship a hacked iPhone to a nonexistent employee and hope the device sits in the mailroom, scanning for nearby wireless connections in order to break into a computer network in an ultra-secure building. Their talks served as a reminder of the danger of physical attacks as a way to breach hard-to-crack computer networks. As technology gets cheaper and more powerful, from cell phones that act as personal computers to minuscule digital bugging devices, it is enabling a new wave of clever attacks that, if pulled off properly, can be as effective and less risky for thieves than traditional computer-intrusion tactics.
0 Comments:
Post a Comment
<< Home