Black Hat Asia
March 24-27, 2015
Marina Bay Sands | Singapore
Black Hat USA
August 1-6, 2015
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 10-13, 2015
Amsterdam RAI | The Netherlands
5/21/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2014: Focus on Mobile

So far all our intel updates focused on the many exciting training opportunities that'll be on offer at Black Hat USA 2014. But now that we've revealed the upcoming slate of Black Hat briefing sessions, we'd like to highlight the best of the best briefings, too. Today we'll start with a focus on mobile -- let's dive in.

It's not widely known, but mobile service providers have a hidden and pervasive level of control over their customers' devices; someone with knowledge of these mechanisms could leverage them for cellular exploitation on a global scale. At Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik and Marc Blanchou will reveal the extent of their reverse engineering of these back doors, subtle flaws in how they're implemented, and how they achieved over-the-air (OTA) code execution on major cellular platforms and networks. They'll also release open-source tools to help assess and protect from these threats.

Mobile Device Management (MDM) solutions are a mainstay in modern enterprise IT, giving security teams a way to control risks from mobile malware and the loss/theft of devices carrying corporate data. But who watches the watchmen? In Mobile Device Mismanagement Stephen Breen will assess the security qualities of these expensive, rarely studied systems, focusing on a number of vulnerabilities, common across different products, that have allowed Breen and associates to access sensitive information on MDM-secured devices. TrustZone is an industry-leading solution for security-critical tasks on ARM-based devices, claiming "100%" security in such tasks as managing secure boot, storing DRM keys, supporting mobile payments, and verifying the integrity of the live OS kernel. Come to Reflections on Trusting TrustZone for a deep dive into the inner workings of a major vendor's TrustZone kernel, where Dan Rosenberg will brief you on a new vulnerability and use it to permanently unlock a major vendor's Android phone bootloader.

Mobile Point-of-Sale (mPOS) systems allow small businesses and drug dealers to accept credit card payments using a smartphone. You won't be surprised to hear that mobile security experts Nils and Jon Butler have discovered a series of mPOS vulnerabilities that give them code execution through a variety of vectors. Come to their Briefing, Mission mPOSsible, to hear all about the weaknesses of current mPOS solutions and see live attack demos, including a malicious credit card that drops a remote root shell on the unsuspecting system.

Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gnuian
50%
50%
gnuian,
User Rank: Ninja
5/21/2014 | 9:03:17 PM
The Backfiring Management Infrastructure
How true: MDM, MAM, MIM - there are so many companies jumping on the mobile management train, releasing mobile apps for the on-the-go IT admin, and so forth, but at the same time opening up a potential digital disaster if just one hole is found in an MxM infrastructure.  It reminds me of when SAP first came on the scene, and all the clones that motivated, and the exploits that followed, opening up entire Enterprise infrastructures up like oysters.  Looking forward to more in-depth analysis on the MxM security problem.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.