Def Con 2015

Pierluigi Paganini August 18, 2015
ICS-CERT warns for 0-Day vulnerabilities in SCADA systems

The ICS-CERT has recently published six security advisories to warn organizations about a number of 0-day flaws in SCADA systems. The ICS-CERT has published six advisories to warn organizations about the presence of Zero-Day Flaws in SCADA Systems. Aditya K. Sood, security researcher at Elastica, has revealed in a talk at the Def Con 2015 conference several vulnerabilities […]

Pierluigi Paganini August 11, 2015
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]

Pierluigi Paganini August 11, 2015
Internal modem can be exploited by malware to gain persistence

Two security experts at the last Def Con hacking conference have demonstrated how Internal LTE/3G modems can be hacked to help malware survive OS reinstalls Many users totally ignore that LTE/3G modems built into new business laptops and tablets have a dedicated processor and operating system that could be exploited by threat actors to maintain persistent […]