Black Hat Asia
March 24-27, 2015
Marina Bay Sands | Singapore
Black Hat USA
August 1-6, 2015
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 10-13, 2015
Amsterdam RAI | The Netherlands
5/21/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2014: Focus on Mobile

So far all our intel updates focused on the many exciting training opportunities that'll be on offer at Black Hat USA 2014. But now that we've revealed the upcoming slate of Black Hat briefing sessions, we'd like to highlight the best of the best briefings, too. Today we'll start with a focus on mobile -- let's dive in.

It's not widely known, but mobile service providers have a hidden and pervasive level of control over their customers' devices; someone with knowledge of these mechanisms could leverage them for cellular exploitation on a global scale. At Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik and Marc Blanchou will reveal the extent of their reverse engineering of these back doors, subtle flaws in how they're implemented, and how they achieved over-the-air (OTA) code execution on major cellular platforms and networks. They'll also release open-source tools to help assess and protect from these threats.

Mobile Device Management (MDM) solutions are a mainstay in modern enterprise IT, giving security teams a way to control risks from mobile malware and the loss/theft of devices carrying corporate data. But who watches the watchmen? In Mobile Device Mismanagement Stephen Breen will assess the security qualities of these expensive, rarely studied systems, focusing on a number of vulnerabilities, common across different products, that have allowed Breen and associates to access sensitive information on MDM-secured devices. TrustZone is an industry-leading solution for security-critical tasks on ARM-based devices, claiming "100%" security in such tasks as managing secure boot, storing DRM keys, supporting mobile payments, and verifying the integrity of the live OS kernel. Come to Reflections on Trusting TrustZone for a deep dive into the inner workings of a major vendor's TrustZone kernel, where Dan Rosenberg will brief you on a new vulnerability and use it to permanently unlock a major vendor's Android phone bootloader.

Mobile Point-of-Sale (mPOS) systems allow small businesses and drug dealers to accept credit card payments using a smartphone. You won't be surprised to hear that mobile security experts Nils and Jon Butler have discovered a series of mPOS vulnerabilities that give them code execution through a variety of vectors. Come to their Briefing, Mission mPOSsible, to hear all about the weaknesses of current mPOS solutions and see live attack demos, including a malicious credit card that drops a remote root shell on the unsuspecting system.

Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gnuian
50%
50%
gnuian,
User Rank: Ninja
5/21/2014 | 9:03:17 PM
The Backfiring Management Infrastructure
How true: MDM, MAM, MIM - there are so many companies jumping on the mobile management train, releasing mobile apps for the on-the-go IT admin, and so forth, but at the same time opening up a potential digital disaster if just one hole is found in an MxM infrastructure.  It reminds me of when SAP first came on the scene, and all the clones that motivated, and the exploits that followed, opening up entire Enterprise infrastructures up like oysters.  Looking forward to more in-depth analysis on the MxM security problem.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.