Uncategorized

ATM machine spraying virus spread by banknotes the Bluetooth light bulbs the

Top hackers all over the world, boiling in the same Auditorium, is a kind of experience? Hold talk, BlackHat USA 2016 (United States Black Hat Conference) is present.

Gloomy in the Western, mostly wearing a black hat villain.

In the cyber world, black hat hackers cyber criminals said.

However, don’t think that BlackHat USA is a global network of criminals “crime exchange of experience”. Black Hat Conference is the world’s biggest gathering of white-hat hackers. (Called the Black Hat Conference is: that sounds cool … )

Paul Frank iPad Air Case

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“BlackHat VS WhiteHat (was wearing a black hat and a little more handsome)”

In the eyes of hackers around the world, BlackHat is the presence of a Holy Grail that people like (Zhuang), (b) known as BH. Standing on the rostrum in BH do share is a lot of hacker-free glory. Everying? You don’t know BlackHat, quietly missed as soon as possible.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“BlackHat 2014 data map”

BlackHat?

In 1993, the year when 18-year old genius hacker Jeff Moss created the DefCon hacker party in order to escort the students. Four years later, in 1997, he founded the BlackHat. So far, which they still run together.

In 20 years, BlackHat hackers around the world gradually recognized world-class conferences. Although BlackHat with breakout in several cities around the world, but the most “red seed” is still afflicted by a year in “Sin City” Las Vegas for BlackHat USA. Have a number you can prove the value of this Conference: in 2005 Jeff Moss sold Black Hat to CMP Media, earned $ 13.9 million.

Each year the world’s top hackers will at this meeting announce their latest research results

Small crack Wi-Fi and the Hotel TV billing systems, use of public charging stations to crack iPhone;

Spray to control intelligent cars, ATM machine money, control a smart rifle;

Can even take over a chemical plant production equipment, or let the satellite positioning system.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“Local time on August 2, 2016 BlackHat hacker training camp in a classroom”

BlackHat needs what positions?

BlackHat is divided into two parts. Keynote speech at the hackers and hacker training camp.

Hacker training camp: this session usually starts in the speech the previous day by various sponsors (mostly security company) for aspiring hacker training the children’s shoes. Of course, this link also guarantees that the keynote speech at the hackers links not be interfered by sponsors, so as to maintain the neutrality of the valuable.

Keynote speech at the hackers: BlackHat’s plays. Several breakout firing, hackers to share their latest achievements for a year, hole open, filled with the human brain.

Trends in security technology, the latest cracking tools are showed in the keynote. Who do not have the opportunity to visit the casino to participate in hacker training camp for children’s shoes, concerns a speech can be a good way to understand hacker frontier.

BlackHat USA 2016

United States local time on August 3, 2016 and 4th (Beijing time on August 4-5th), the BlackHat USA presentation Show will be staged. Lei feng’s network editors arrived on the scene pulled out the latest sharp materials.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“BlackHat 2016 pink media card”

Any bright spots are the BlackHat this year?

Give you a few figures,

The BlackHat reception will be more than 11000 people number created BH history.

175 top hacker as a speaker, giving 120 keynote, also created the 19-year history.

What are its fried-day question? Together we can advance.

Destroyed three views: the truth about Internet

As the opening of the BlackHat speakers, Dan·kamingsiji (Dan Kaminsky) deserves it. The “old Polanski” in 2008, dominated the tech headlines, because he discovered the Internet’s domain name system (DNS) of the underlying design flaw. This flaw makes Internet security system built decades came crashing down, he finds, you can simply let the massive paralysis of the Internet. To date, he remains on this planet have a reset world of Internet DNS “seven”. Paul Frank iPad Air Case

This year, that has a deconstruction of the Internet hacker is back from the perspective of God. Look, he has a subversive Internet underlying cognitive discovery, because his speech was entitled: “the hidden structure: why the Internet works, how we lost it, what do hackers do. ”

Honestly, I would like to provide an understanding of “Internet” of the new way, let it serve the people of the time, will not hurt the innocent.

He said.

Sounds in its mouth, it is worth waiting.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“Dan·kamingsiji (Dan Kaminsky)”

HTTPS encryption

HTTPS network encryption was considered an ox x, by this way, the server and client Exchange data is private. But security researcher from SafeBreach will show a way of forcing the browser to use a specific proxy settings. In this case, even the encrypted protocol, which contains data, could be disclosed.

Imagine that you write every love letter to girlfriend, opened by postman seen feeling. The world is so scary.

All holes in the world, is the biggest man

Referred to in the title, foolproof system, as well as human not a pig.

In order to study the social worker attacked, from the University of Google Hacking Elie Bursztein, in a cast around 300 USB flash drive with malicious programs, results in some unexpected, 98% u were seized, 48% USB flash drive is inserted into the new owner’s computer. Even a lot of people will take the initiative to click on one of these files. They will share in a speech from the 300 results found in the u.

Topics for social workers, as well as brain hole in the results of a group of hackers from United States Judith Tabron of Hofstra University will introduce a new technology by telephone to talk across the content and theme, automatically determining if someone is a liar. To phone the mired in confusion a timely reminder to the victims.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

Fly out of the ATM machine money slap face

Spend 2000 dollars, just 15 minutes to recover 20000-50000. Want to do that, in addition to dream and join the MLM organization, only attacks on ATM machines. In fact, as early as 2015, someone showed attacks on ATM machines at the BlackHat. But after that, banks of ATM machines were upgraded. But hackers Weston Hecker for Bank ATM machine of the new generation of security is still very unsatisfactory, and a new round of research on crack. By NFC cracked, he can as far as 400 miles off remote control an ATM machine spitting money. Paul Frank iPad Air Case

Same with money, hackers Salvador Mendoza set his sights on the Samsung Pay, because the Samsung Pay support dynamic Token authentication, but does not guarantee that every payment must be carried out on the same device. So a hacker can attack through a special method, make the attacked phone in flight mode, so Samsung server and this is the “lost” State. In the meantime, hackers can steal the proof of payment.

ATM machine spraying virus spread by banknotes, the Bluetooth light bulbs, the world's top hackers Conference BlackHat rare break beat

“Car hacks Chali·mile and kelisi·walasaike”

Light bulb transmission, cars snaking, wayward intelligent hardware

Have you ever wanted to, your intelligent Bluetooth light bulb above your head secretly spread a virus? Hacker Colin O’Flynn has such abilities. To decrypt the Bluetooth device’s BootLoader, he could gain full privileges bulb chip, which can decrypt any sensitive information.

Once hacked Jeep Chrysler, resulting in the recall of 1.4 million vehicles of the legendary hacker Charles and Miller will return to BlackHat, from the title, this time they should not put the car into the ditch again, based on original research but with better results.

Familiar with children’s shoes are known for hackers, Chris and Miller have achieved only under certain circumstances–for cars-such as speed brakes and steering wheel controls, but does not control the normal cars. This time they will use a new way to attack cars CAN bus according to the introduction to speech, they would be in the case of automatic control braking and steering wheel. No doubt for a greater risk to the passengers on the bus.

Of course this BlackHat gathered a lot of Chinese hackers, from the clouds (you know), Baidu, Alibaba, 360, Tsinghua national laboratory of information technology, white hat is also giving top speech, Lei feng’s network (search for “Lei feng’s network” public attention) will continue to follow up the reports.

White Hat Black Hat Conference, let us wait and see.

Leave a comment