Following 5G implementation in US airports, we discuss the technical features, security concerns, and potential risks this implementation carries for the industry and its customers, as well as provide some recommendations.
The legacy programming environments of widely used industrial machines could harbor virtually undetectable vulnerabilities and malware. Our security analysis of these environments reveals critical flaws and their repercussions for smart factories.
To determine threat actors' degree of knowledge in compromising a smart factory, we deployed our most elaborate honeypot to date. The incidents we observed show the kinds of attacks that can easily affect poorly secured manufacturing environments.
Millions of security cameras and other internet of things (IoT) devices were found with critical security flaws involving peer-to-peer (P2P) communications technology. The weaknesses can expose the devices to credential theft, eavesdropping, and hijacking.
A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.
With plenty of voice-based internet-of-things devices in use around the world, it is expected that they will become riddled with compatibility issues and privacy concerns. What threats are there and what can be done to mitigate them?
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.