DEF CON 18 - Jackpotting Automated Teller Machines Redux
mjacobat May 07,2015 Great video from the DefCon security conference. I agree with nbodyk comment about the typical perspective of computer hacking coming from the system software and do not think too much that the hardware can be hacked as well. This could fall under the Supply Chain Interdiction topic we discussed in class.
mrgodfrey3at July 01,2015 Backup Backup Backup you data. I can't believe major organizations do not have backups of their business critical data. As long as people keep paying for their own data, then crypt will still exist.
tlawlessat July 04,2015 An underlining theme to the success that hackers have is the fact that humans are part of designing and operating the technology and humans are generally flawed (or operate with biases and constraints that generate flaws). This is not something that will change in our lifetime simply because it's not economical. For a company to protect every device from every single type of attack vector is just not good business so these flaws will always exist. What responsibility do corporations have to develop "hack resistant" products for consumers?
arautat July 23,2015 Almost all hardware hacks require physical presence close to the equipment or system;increasing visibility of hackers. May be that is why most hackers prefer hacking networks ,websites and data bases, since it is easier to stay anonymous.
brober15at October 22,2015 I think it's great/scary that the manufacturers can spend a lot of time, energy and money to secure their devices, only to have their efforts defeated by two smart people. Not cutting the epoxy around the booby trap was a great example of how being thoughtful and resourceful can get around something intended to keep you out. Though as several people mentioned, the need for lots of time and physical access is probably the best security measure for hardware. It was interesting to hear how you could go from the thermostat in one hotel room to being able to control others.