Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
May 10-13, 2022
Hybrid/Marina Bay Sands, Singapore
Black Hat USA
August 6-11, 2022
Las Vegas, NV, USA
Black Hat Europe
December 5-8, 2022
London
5/21/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat USA 2014: Focus on Mobile

So far all our intel updates focused on the many exciting training opportunities that'll be on offer at Black Hat USA 2014. But now that we've revealed the upcoming slate of Black Hat briefing sessions, we'd like to highlight the best of the best briefings, too. Today we'll start with a focus on mobile -- let's dive in.

It's not widely known, but mobile service providers have a hidden and pervasive level of control over their customers' devices; someone with knowledge of these mechanisms could leverage them for cellular exploitation on a global scale. At Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik and Marc Blanchou will reveal the extent of their reverse engineering of these back doors, subtle flaws in how they're implemented, and how they achieved over-the-air (OTA) code execution on major cellular platforms and networks. They'll also release open-source tools to help assess and protect from these threats.

Mobile Device Management (MDM) solutions are a mainstay in modern enterprise IT, giving security teams a way to control risks from mobile malware and the loss/theft of devices carrying corporate data. But who watches the watchmen? In Mobile Device Mismanagement Stephen Breen will assess the security qualities of these expensive, rarely studied systems, focusing on a number of vulnerabilities, common across different products, that have allowed Breen and associates to access sensitive information on MDM-secured devices. TrustZone is an industry-leading solution for security-critical tasks on ARM-based devices, claiming "100%" security in such tasks as managing secure boot, storing DRM keys, supporting mobile payments, and verifying the integrity of the live OS kernel. Come to Reflections on Trusting TrustZone for a deep dive into the inner workings of a major vendor's TrustZone kernel, where Dan Rosenberg will brief you on a new vulnerability and use it to permanently unlock a major vendor's Android phone bootloader.

Mobile Point-of-Sale (mPOS) systems allow small businesses and drug dealers to accept credit card payments using a smartphone. You won't be surprised to hear that mobile security experts Nils and Jon Butler have discovered a series of mPOS vulnerabilities that give them code execution through a variety of vectors. Come to their Briefing, Mission mPOSsible, to hear all about the weaknesses of current mPOS solutions and see live attack demos, including a malicious credit card that drops a remote root shell on the unsuspecting system.

Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to register.

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
RetiredUser
RetiredUser,
User Rank: Ninja
5/21/2014 | 9:03:17 PM
The Backfiring Management Infrastructure
How true: MDM, MAM, MIM - there are so many companies jumping on the mobile management train, releasing mobile apps for the on-the-go IT admin, and so forth, but at the same time opening up a potential digital disaster if just one hole is found in an MxM infrastructure.  It reminds me of when SAP first came on the scene, and all the clones that motivated, and the exploits that followed, opening up entire Enterprise infrastructures up like oysters.  Looking forward to more in-depth analysis on the MxM security problem.
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file