Black Hat Asia
March 28-31, 2017
Singapore
Black Hat USA
July 22-27, 2017
Las Vegas, NV, USA
Black Hat Europe
December 4-7, 2017
London UK
5/21/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2014: Focus on Mobile

So far all our intel updates focused on the many exciting training opportunities that'll be on offer at Black Hat USA 2014. But now that we've revealed the upcoming slate of Black Hat briefing sessions, we'd like to highlight the best of the best briefings, too. Today we'll start with a focus on mobile -- let's dive in.

It's not widely known, but mobile service providers have a hidden and pervasive level of control over their customers' devices; someone with knowledge of these mechanisms could leverage them for cellular exploitation on a global scale. At Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik and Marc Blanchou will reveal the extent of their reverse engineering of these back doors, subtle flaws in how they're implemented, and how they achieved over-the-air (OTA) code execution on major cellular platforms and networks. They'll also release open-source tools to help assess and protect from these threats.

Mobile Device Management (MDM) solutions are a mainstay in modern enterprise IT, giving security teams a way to control risks from mobile malware and the loss/theft of devices carrying corporate data. But who watches the watchmen? In Mobile Device Mismanagement Stephen Breen will assess the security qualities of these expensive, rarely studied systems, focusing on a number of vulnerabilities, common across different products, that have allowed Breen and associates to access sensitive information on MDM-secured devices. TrustZone is an industry-leading solution for security-critical tasks on ARM-based devices, claiming "100%" security in such tasks as managing secure boot, storing DRM keys, supporting mobile payments, and verifying the integrity of the live OS kernel. Come to Reflections on Trusting TrustZone for a deep dive into the inner workings of a major vendor's TrustZone kernel, where Dan Rosenberg will brief you on a new vulnerability and use it to permanently unlock a major vendor's Android phone bootloader.

Mobile Point-of-Sale (mPOS) systems allow small businesses and drug dealers to accept credit card payments using a smartphone. You won't be surprised to hear that mobile security experts Nils and Jon Butler have discovered a series of mPOS vulnerabilities that give them code execution through a variety of vectors. Come to their Briefing, Mission mPOSsible, to hear all about the weaknesses of current mPOS solutions and see live attack demos, including a malicious credit card that drops a remote root shell on the unsuspecting system.

Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
5/21/2014 | 9:03:17 PM
The Backfiring Management Infrastructure
How true: MDM, MAM, MIM - there are so many companies jumping on the mobile management train, releasing mobile apps for the on-the-go IT admin, and so forth, but at the same time opening up a potential digital disaster if just one hole is found in an MxM infrastructure.  It reminds me of when SAP first came on the scene, and all the clones that motivated, and the exploits that followed, opening up entire Enterprise infrastructures up like oysters.  Looking forward to more in-depth analysis on the MxM security problem.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.