Vulnerabilities in a Connected Future

Presented at HOPE Number Six (2006), July 23, 2006, 1 p.m. (60 minutes).

This presentation deals with the vulnerabilities of emerging connected technologies and their uses. As manufacturers continue to pump out new technology without properly assessing the risks, those risks end up affecting customers. The focus of this presentation deals with vulnerabilities and attacks on Smarthomes and Smartcars taken from analyzing these emerging technologies. Vulnerabilities also exist in these technologies from how users interface with and utilize them. Modern connected technologies are intrusive and it is important that everyone understand the dangers. This presentation also delivers a healthy dose of problems with the next generation IP protocol, dealing with problems in its implementation and future. IPv6 will play a big part in the connected future with integration into previously mentioned technologies and mobile devices. Lastly, the presentation will discuss problems with biometric authentication technologies and refute how these devices are being touted as security silver bullets.

(There is a seven minute audio gap in this panel due to a microphone malfunction. We've edited out the silent bit on the audio archive and it appears as silence on the DVD. If you happen to have a recording of the missing section, please contact us.)


Presenters:

  • Sysmin
    Sysmin resides in Florida where he works as a senior security consultant for a large consulting firm. He has been working in the area of information security and technology for over ten years. He is also a security researcher and founder of the security research think tank The Hacker Pimps. He is a regular public speaker and has spoken at numerous security events including: DefCon, ShmooCon, ToorCon, PhreakNIC, and Interz0ne just to name a few. Sysmin conducts research in many areas including the IPv6 protocol and is also a member of the North American IPv6 Task Force. He holds many high level certifications from organizations such as the International Information Systems Security Certification Consortium, National Security Agency, Check Point, and EC Council among others. He holds a bachelor of science in information technology and is currently finishing up his master of science in information technology with a specialization in information security.
  • QuiGon
    QuiGon (CISSP-ISSAP, NSA-IAM) resides in Jacksonville, Florida and is currently providing system administration services to an advertising, PR, and marketing firm. He has 14 years of experience in electronics, system administration, networking, and system security. QuiGon is best known for his work with the North American IPv6 Task Force, the IPv6 Forum, and FairuzaWRT which is Linksys WRT54GS firmware designed for "drive by upload" attack support. He has spoken on IPv6 and other topics at several venues, including DefCon, PhreakNIC, ToorCon, and ShmooCon. QuiGon is also a senior member of the Hacker Pimps, a security think tank with several members from all over the U.S. When not totally absorbed by system security related issues, QuiGon can be found tinkering on his home IT lab, actively participating as vice president of the Jacksonville Linux User's Group, and trying to find speakers for the Jacksonville 2600 chapter.

Links:

Similar Presentations: