DEMO: Uncovering IoT Vulnerabilities in a CCTV Camera
James Lyne, Global Head of Security Research, Sophos & SANS, discusses how IoT security concerns have lacked specificity on what the real issues are -- until recently. Lyne demonstrates how he assesses a CCTV camera for vulnerabilities and finds a total lack of security -- borderline humorous. Username: Admin.
Digging around in the binary and firmware is just one way for hackers to tap into IoT products -- they can also simply find the password printed on the box and discovered in photos online. In his live demo, Lyne shows how to reverse engineer security protocols.
https://www.rsaconference.com/events/us17
Видео DEMO: Uncovering IoT Vulnerabilities in a CCTV Camera канала RSA Conference
Digging around in the binary and firmware is just one way for hackers to tap into IoT products -- they can also simply find the password printed on the box and discovered in photos online. In his live demo, Lyne shows how to reverse engineer security protocols.
https://www.rsaconference.com/events/us17
Видео DEMO: Uncovering IoT Vulnerabilities in a CCTV Camera канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
The Hugh Thompson Show: Artificial IntelligenceRSA Conference 2022 Innovation Sandbox - Winner's AnnouncementInnovation Sandbox 2019 - Salt SecurityTackling Cyber-Enabled Crime at Scale: Moving Enforcement ForwardWebcast: Remember When We Used to Call It “Information Security”? Let’s Go Back to ThatWebcast: Unraveling the Recipe for Resilient Enterprise Security OperationsRSA Conference 2022 Innovation Sandbox - TorqDazz — RSA Conference 2023 Innovation SandboxWinner's Announcement — RSA Conference 2023 Innovation SandboxCombatting Evolving Cyber Threats: Leading with DisruptionHealthcare and Cybersecurity | Highlights from RSAC 2018RSAC 2012 Keynote - The Urgent Need for a More Effective Approach to Security - Philippe CourtotHiddenLayer — RSA Conference 2023 Innovation SandboxReducing Payment Fraud with SWIFT Customer Security Controls FrameworkOperation Full CircleQuantitative Security: Using Moneyball Techniques to Defend Corporate NetworksThe Sleeper AwakesGenomics: A New Frontier for Privacy and SecurityRSA Conference Lifetime Achievement Award — Presented to Alan PallerRethink the Way You Secure Your Organization with Intrinsic SecurityInto the Mind of an IoT Hacker | How to Protect IoT Networks & Devices