Did this quadcopter just swipe all the data in your cell phone? Image Courtesy http://axelsdiy.brinkeby.se
New Types of Attacks Born Daily
IndustryTap reported about a German company that requires all visitors to its conference rooms to deposit their cell phones in heavy metal boxes, blocking fishing or recording devices. But if a cellphone is vulnerable in a conference room, it is certainly vulnerable when an executive carries it about in a pocket.Drones are now being used to steal bank data and passwords, Amazon account information, and more, by remotely accessing cell phones using drones. Hackers are stealing information from an estimated 200 cell phones per hour. A demonstration of the technique was recently carried out by a drone called Snoopy in the UK, which attacks cell phones using Wi-Fi.
When an unsuspecting cellphone Wi-Fi user logs into the Snoopy “quad copter network” while sipping a Latte at Starbucks, they “give away the store” including any information transmitted, credit card information, user names and passwords.
How Do Black & White Hat Conferences Help with Threats?
Companies from energy or utilities, to federal agencies and financial institution try to find the best “white hat” hackers to help protect their information infrastructure and are increasingly attending hacker events to identify the best talent and learn about new trends. The world is now filled with “White Hat and “Black Hat” conferences featuring famous and infamous hackers who present briefings and training.“Black Hat”, for example, started out as an annual event in Las Vegas, Nevada, but now takes place at locations throughout the world. An average event attracts up to 10,000 people. For a list of current and future events, visit The Cyberwire.
No comments:
Post a Comment