Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Black Hat, DefCon Expose Flaws in Voting Machines to Smart Guns

    By
    Sean Michael Kerner
    -
    July 31, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Black Hat, DefCon Expose Flaws in Voting Machines to Smart Guns

      1 - Black Hat, DefCon Expose Flaws in Voting Machines to Smart Guns

      The annual week of security conferences—the back-to-back Black Hat USA and DefCon events—colloquially referred to as “hacker summer camp” ran from July 22-30. The Black Hat show that was held at Mandalay Bay celebrated its 20th anniversary and was headlined by a keynote address from Facebook Chief Security Officer Alex Stamos. Perhaps the biggest single flaw detailed at Black Hat was the Broadpwn vulnerability that impacted hundreds of millions of iOS and Android devices. At the DefCon 25 conference, which was held at Caesar’s Palace, voting machines were hacked, as were internet of things (iOT) devices, cars, industrial control systems and even smart guns. In this slide show, eWEEK takes a look at some of the highlights of the 2017 Black Hat USA and DefCon conferences.

      2Black Hat Now 20 Years Old

      2 - Black Hat Now 20 Years Old

      Jeff Moss, founder of both the Black Hat and DefCon security conferences, used the Black Hat keynote stage to reflect on the 20th anniversary of Black Hat. The Black Hat conference debuted five years after DefCon as a conference for security professionals, while DefCon is more of a hacker convention.

      3Facebook Chief Security Officer Explains What’s Important

      3 - Facebook Chief Security Officer Explains What's Important

      While a lot of media attention around security tends to deal with zero-day exploits, Alex Stamos, chief security officer at Facebook, said during his Black Hat keynote that the vast majority of security incidents involve various forms of everyday abuse and not zero-day vulnerabilities.

      4Christian Slater Poses With Black Hat Attendees

      4 - Christian Slater Poses With Black Hat Attendees

      Hollywood actor Christian Slater, who has had multiple roles as a hacker in TV shows and film, was in an HP-sponsored booth taking pictures with attendees.

      5Understanding Ransomware

      5 - Understanding Ransomware

      Google security researchers detailed how the ransomware payment chain works during a Black Hat session.

      6Broadpwn Flaw Revealed

      6 - Broadpwn Flaw Revealed

      Exodus Intelligence security researcher Nitay Artenstein detailed the Broadpwn vulnerability in Broadcom WiFi chips that impacted all iOS and Android devices. Thanks to Artenstein’s responsible disclosure to the impacted vendors, the flaws were patched several weeks prior to the Black Hat presentation.

      7Voting Machines Hacked at DefCon

      7 - Voting Machines Hacked at DefCon

      At DefCon 25, hackers were given the opportunity to legally attempt to attack voting machines, rapidly discovering multiple vulnerabilities in different voting machines.

      8Hacking All the IoT Things

      8 - Hacking All the IoT Things

      The internet of things (IoT) village at the DefCon provided hackers with the opportunity to quite literally hack all the things.

      9FTC Commissioner Explains How the Government Helps Security

      9 - FTC Commissioner Explains How the Government Helps Security

      U.S. Federal Trade Commissioner Terrell McSweeny explained the various actions the FTC has taken over the years to help protect consumers and privacy.

      10Hacking Cars at DefCon

      10 - Hacking Cars at DefCon

      The Car Hacking Village at DefCon provided attendees with the opportunity to learn about and test various components of the modern car’s electronics systems.

      11Taking Aim at Industrial Control Systems

      11 - Taking Aim at Industrial Control Systems

      The ICS Village at DefCon provided multiple resources and components to help attackers attempt to hack the security of industrial control systems (ICS).

      12Make Your Own Tin Foil Hat

      12 - Make Your Own Tin Foil Hat

      As a nod to security paranoia, DefCon attendees were able to make their own tin foil hats.

      13Cabletap Vulnerabilities Revealed

      13 - Cabletap Vulnerabilities Revealed

      Security researchers at DefCon disclosed the new Cabletap set of flaws. Cabletap is a set of 26 related vulnerabilities that impact wireless gateways and set-top boxes provided to consumers by internet service providers.

      14Smart Gun Apparently Not So Smart

      14 - Smart Gun Apparently Not So Smart

      A security researcher known publicly only as “Plore” detailed a number of vulnerabilities in the Armatix iP1 smart gun. The vulnerabilities could enable a hacker to fire the weapon without the proper authority or to restrict the ability of a user to fire the weapon.

      15Wall of Sheep Shows Insecure Users

      15 - Wall of Sheep Shows Insecure Users

      The Wall of Sheep at DefCon was able to catch many unsuspecting users of the open WiFi network that connected to services without proper encryption.

      16Black Hat Returns in August 2018

      16 - Black Hat Returns in August 2018

      The Black Hat 2018 event is scheduled for Aug. 4-9, 2018.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.