Top 3 Talks On IoT Security From DEF CON 26

Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada. Following is the list of top talks on IoT Security at DEF CON 26.

DEFCON 201826th Def-Con Hacking Conference is among one of the most main event on Computer, Information Technology, Cyber Security, Software, Hacking and Hack topics.

(Source: DEF CON 26)

2m2b58h.jpg?width=750

1. YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !

Speakers: 

Damien "virtualabs" Cauquil, Head of Research & Development, Digital Security

In this talk, we will demonstrate how this attack works on various devices, how to protect them and avoid hijacking and of course release the source code of the tool.

>>>Go To Presentation

2hpsodk.jpg?width=750

2. Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS & MODERN CITIES

Speakers:

  • Daniel "unicornFurnace" Crowley, Research Baron, IBM X-Force Red
  • Mauro Paredes, Hacker
  • Jen "savagejen" Savage, Hacker

In this talk, we examine the security of a cross-section of smart city devices currently in use today to reveal how deeply flawed they are and how the implications of these vulnerabilities could have serious consequences. 

In addition to discussing newly discovered pre-auth attacks against multiple smart city devices from different categories of smart city technology, this presentation will discuss methods for how to figure out what smart city tech a given city is using, the privacy implications of smart cities, the implications of successful attacks on smart city tech, and what the future of smart city tech may hold.

>>>Go To Presentation

j6hbo1.png?width=750

3. Who Controls the Controllers—Hacking Crestron IoT Automation Systems

Speakers:

Ricky "HeadlessZeke" Lawshae, Security Researcher, Trend Micro

In this talk, we will take a look at different Crestron devices from a security perspective and discuss the many vulnerabilities and opportunities for fun to be found within. I will demonstrate both documented and undocumented features that can be used to achieve full system compromise and show the need to make securing these systems a priority, instead of an afterthought, in every deployment. In short, hijinx will ensue.

>>>Go To Presentation

v3ipsh.png

Your Complete Guide To Top Talks @DEF CON 26

Get your FREE Guide on Top Talks @ DEF CON 26 . Our editorial team has gone through all the talks and handpicked the best of the best talks at DEF CON into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform