Planet Hyperconnected - New lessons for brands in a hyperconnected world by iris worldwide
Hacking, Privacy and Security in a Hyperconnected Society
-
Upload
maurice-dawson -
Category
Technology
-
view
468 -
download
0
Transcript of Hacking, Privacy and Security in a Hyperconnected Society
DescriptionData and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
Perfect World Scenario
Real World ScenarioWhat actually happens...
Photo Share - Excited Giver
Meta Data - Web Extraction
Location - Google Maps: Street View
Web Search on Phone Model
• SEARCH FOR VULNERABILITIES
• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP
• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION
[3] TIME STAMP
• LOCATION PATTERN ANALYSIS [3] [4]
• SIMPLE LATITUDE & LONGITUDE [4]
• SEARCH FOR VULNERABILITIES [2]
• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP [3]
• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION [2] [3]
• ADDITIONAL FIELDS: CAPTION, DESCRIPTION
Maltego - Example
Maltego - Geolocation From and To Tweet [Circular Area]
OWASP Top 10 Vulnerabilities - 2006
Digital Footprint
Maltego - Example
Maletgo - Example Cont.
Maletgo - Example Cont.
Maletgo - Example Cont.
Intelligence Applications
RecommendationsMobile Device
• Anti Virus
• Trusted Applications
• Device Hardening
• Clicking on Unknown Links in Web Broswer
• Check Application Authorizations
Embedded Device
• Scan for Cyber Security Posture
• Limit the Data Shared on Device
Social Media
• Remove GPS Tag
• Remove Metadata
• Limit Posting Revealing Information
• Control Digital Footprint
Bluetooth 2.0 > Versions
• Insecure Versions
• Limit Use
• Limit Pairing
**Even though SSP improves the security of Bluetooth pairing, it has been shownthat MITM attacks against Bluetooth 2.1+EDR, 3.0+HS, and 4.0 devices are possibleby forcing victim devices to use the Just Works association model**
Any QuestionsContact at [email protected]