
There are arguments for and against creating a legislative “right to repair” that would enable consumers to try to fix their own devices rather than having to bring them to a dedicated Apple Store or other specific manufacturer.
The Internet of Things (IoT) is still just as unsecure as ever. Hacking shipping containers with ransomware or even temporarily redirecting their coordinates for a mere few minutes can have drastic consequences on global supply chains. The Sea: In our current COVID-19 environment of supply chain troubles, our reliance upon cross-border shipments became evident. At past DEF CON conferences, hackers have successfully taken over real satellites and used them to take photos. The Air: Satellites and space vehicles can be hacked. As even farm equipment increasingly relies upon technology, the risk is very realthat tractors in the field can be taken over remotely and excessive chemicals released into fields undetected. HACKER DEFCON FULL
The speaker’s group reported being successful in getting the private key for John Deere’s Single Sign On system and for gaining full access. At DEF CON 29, a security researcher with the handle “Sick Codes” demonstrated vulnerabilities in John Deere systems used to monitor industrial farm equipment.
The Land: Even farm equipment can be hacked. Jeff Moss, who founded the DEF CON conference twenty-nine years ago, goes by the handle Dark Tangent. Some attendees are well known by (and only known by) their online handles. You can be whoever you want at a hacker conference. Do you want to be in an elevator when it gets hacked? During the hacker conference, the elevator displays simply read “Disk read error” and various other technical messages and computer code.
The elevators in the hotel had display screens which were usually used to showcase ads for restaurants, concerts, and events.Sound unrealistic? This technique was actually demonstrated back in 2010. Cellular networks can also be spoofed by setting up fake base stations with stronger signals than the nearest legitimate cell tower, enabling unauthorized access even to encrypted calls. Put a bunch of hackers in a room and watch how quickly rogue / fake wireless access points start appearing to mimic the real hotel wireless network to trick users into connecting.
Public networks are unsecure even under normal circumstances.
Due to the aforementioned presence of cybercriminals, I wisely chose to stay off the hotel Wi-Fi and the cellular network. Yet for every black hat hacker, there are untold numbers of genuinely good white hat hackers, security researchers, and tech geeks who simply love a good challenge and love to talk ones and zeroes. There were undoubtedly cybercriminals in attendance at the conference – one of the reasons that the FBI, NSA, and CIA have been known to show up, particularly if a black hat hacker (the bad ones who break into things for criminal reasons) will be on stage delivering a rousing demo of how they successfully took down a company.
Hackers are a very diverse group who seem to share one thing in common: using creative problem-solving to find vulnerabilities in systems.
I braved the 115 degree heat and entered the den of the hackers, and I have put together a list of the top ten things I observed about our collective preparedness as it relates to land, sea, and air, and what risks are on the horizon. Hacking Tesla, Tractors, and the Hotel Elevator: Ten Observations from the DEF CON hacker conference in Las Vegasįresh off the plane from attending the DEF CON 29 hacker conference held at Paris and Bally’s hotels in Las Vegas, Nevada, I am back with a fresh perspective on just how vulnerable we all are when it comes to cyber risk.