Las Vegas security conferences: five things we learnt in July and August

This summer, Las Vegas played host to a number of cyber security conventions, including BSIDES LV (BSides Las Vegas), DEF Con and Black Hat.

Here are five highlights emerging from these recent events:

Mobile phones more vulnerable than ever

Continuing concerns over mobile security emerged at Bsides LV. Guillaume Ross exposed a vulnerability in the URL protocols used on mobile devices, arguing that the URL scheme which enables users, for example, to call a car dealership directly from Safari in iOS is open to interference. It’s even possible for a phone to be hacked, so that phone calls can be made without the owner being aware.

Counter surveillance tips

For those ever concerned about the prying eyes of the state, there were some homebrew tips on offer at DefCon from Phil Polstra, the associate professor of digital forensics at Bloomberg University.

It’s possible, for instance, to use your mobile phone to detect hidden cameras that use infrared light. If you turn on your mobile phone camera and rotate it around the room, any infrared lights will be indicated by a bright purple colour on your smartphone screen.

Moreover, by tuning your car radio to the AM frequency, you may be able to detect if your car is being bugged; your car radio will emit a loud beep, indicating that a certain type of surveillance device is attached to the vehicle.

Traffic control vulnerabilities

At DefCon, Cesar Cerrudo, CTO of IOActive, said that the many devices which interact with motor vehicles use ‘open’ wireless technology. He demonstrated how he was able to take control of a sensor that regulates traffic light times in both New York City and Washington. Potentially, he could have caused a jam by artificially increasing the red signal times, using an interceptor device he stored in his backpack. He was happy merely to demonstrate the possibility.

Fears for home automation

Meanwhile, in his Black Hat talk, security specialist Jesus Molina exposed the vulnerability of an older communication protocol known as KNX, which is used in some hotels, for instance, to control in-room entertainment. Molina could, if he so wished, have hacked the TVs of all the guests so they were watching the same sports channel as him. KNX is, worryingly, also widely used in home automation systems.

A call for better corporate disclosure

For the corporate attendees, there was an uncompromising message from Black Hat speaker Dan Geer, a senior information security officer. He said that corporate security breaches were now becoming so serious that companies should be forced to disclose incidents that befall them. Writing about the presentation, the Financial Times stated:

“Mr Geer called for ‘a public health system’ for the internet where the security of everyone online is given higher priority than the privacy of attack victims.”

Needless to say, his call was met with a mixed reaction from some corporate delegates.

All in all, if any over-arching theme emerged from this year’s Vegas cyber security binge, it was the growing fear for the security of the rapidly expanding Internet of Things.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy