| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In the past, network device awareness (SANS Critical Security Control #1) was achieved through asset monitoring, vuln scanning, Network Access Control (NAC), device authentication, and network/wireless intrusion detection.
Unfortunately, the Internet of Everything has spawned a little-understood and ever-expanding threat vector - the massive proliferation of broad-spectrum wireless, mobile/micro, transient computing devices:
Corporate-sponsored BYOD
Mobile phones/tablets, Wireless APs, MiFis, microcells
4G/LTE, Bluetooth, & RFID/NFC-enabled consumer devices
Micro, ultra-portable, & wearable computing devices
Wireless thermostats, burglar alarms, IP cameras, UAVs/drones, heating/cooling systems, power distribution, & industrial automation
A rapidly-expanding market of low-cost, plug-and-play cyber espionage devices, the "Internet of Evil Things".
This attack surface has expanded beyond the visibility of todayÕs monitoring and intrusion detection systems. YesterdayÕs defenses are no longer adequate. Come learn all the ways criminals are getting access while bypassing all alarms and monitored networks. New attacks and possible defenses will be shown live. Rick Farina (Zero_Chaos) is a well known wireless hacker and member of the DEF CON Wireless Village team and the Wireless Capture the Flag team. He has been researching all manner of layer one and two hacking for the past fifteen years, most recently as Director of Engineering for Pwnie Labs at Pwnie Express.
Dave Porcello (grep) is the widely respected founder of Pwnie Express. He attained fame by introducing the world to the "PwnPlug" covert penetration testing drop box, however, his recent research has all be focused on how to product people from similar devices which are marketed for malicious purpose (and worse).
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast