Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada. Following is the list of top talks on IoT Security at DEF CON 26.

DEFCON 201826th Def-Con Hacking Conference is among one of the most main event on Computer, Information Technology, Cyber Security, Software, Hacking and Hack topics.

(Source: DEF CON 26)

1. YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !

Speakers: 

Damien "virtualabs" Cauquil, Head of Research & Development, Digital Security

In this talk, we will demonstrate how this attack works on various devices, how to protect them and avoid hijacking and of course release the source code of the tool.

>>>Go To Presentation

2. Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOG...

Speakers:

  • Daniel "unicornFurnace" Crowley, Research Baron, IBM X-Force Red
  • Mauro Paredes, Hacker
  • Jen "savagejen" Savage, Hacker

In this talk, we examine the security of a cross-section of smart city devices currently in use today to reveal how deeply flawed they are and how the implications of these vulnerabilities could have serious consequences. 

In addition to discussing newly discovered pre-auth attacks against multiple smart city devices from different categories of smart city technology, this presentation will discuss methods for how to figure out what smart city tech a given city is using, the privacy implications of smart cities, the implications of successful attacks on smart city tech, and what the future of smart city tech may hold.

>>>Go To Presentation

3. Who Controls the Controllers—Hacking Crestron IoT Automation Systems

Speakers:

Ricky "HeadlessZeke" Lawshae, Security Researcher, Trend Micro

In this talk, we will take a look at different Crestron devices from a security perspective and discuss the many vulnerabilities and opportunities for fun to be found within. I will demonstrate both documented and undocumented features that can be used to achieve full system compromise and show the need to make securing these systems a priority, instead of an afterthought, in every deployment. In short, hijinx will ensue.

>>>Go To Presentation

Your Complete Guide To Top Talks @DEF CON 26

Get your FREE Guide on Top Talks @ DEF CON 26 . Our editorial team has gone through all the talks and handpicked the best of the best talks at DEF CON into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Views: 75

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service