25 Jul '12, 2pm

Can hackers wipe data from your smartphone? ECU security expert demonstrates it's possible #blackhat

Can hackers wipe data from your smartphone? ECU security expert demonstrates it's possible #blackhat

So much to-do has been generated around preventing unauthorized mobile devices from accessing sensitive corporate resources, but what happens when security researchers turn that model on its head? What happens when the theoretical attackers use unauthorized, spoofed servers to connect to mobile devices? This Thursday at Black Hat, an Australian researcher will demonstrate a proof-of-concept attack that employs just that type of attack, using a man-in-the-middle connection and Microsoft Exchange to conduct unauthorized remote wipes on mobile devices. Click here for more of Dark Reading's Black Hat articles. The genesis for the research, says Peter Hannay, a PhD student, researcher and lecturer based at Edith Cowan University in Perth Western Australia, came from the idea that mobile Exchange attacks don't necessarily need to compromise services in the organization if the en...

Full article: http://www.eetimes.com/electronics-news/4391099/Black-Hat...

Tweets

Black Hat Forum Black Hat SEO:

blackhatworld.com 29 Jul '12, 3pm

Black Hat SEO Black Hat SEO Black Hat SEO Tools Blogging Cloaking and Content Generators Proxies Proxies For Sale Proxy Li...

@A_Limys did i show you this before?

ebay.com.sg 28 Jul '12, 2pm

New without tags: A brand-new, unused and unworn item that is not in its original retail packaging or may be missing its o...

This Week In Cybercrime: Black Hat Edition

spectrum.ieee.org 28 Jul '12, 9pm

How secure do you feel about the wireless router you use at home? Maybe more than you should. Researchers at AppSec Consul...

"Bitcoin was developed as a way to exchange bet...

irdial.com 25 Jul '12, 4pm

Mr. Kramer can use email to send and receive messages without understanding SMTP or POP syntax. He can write blog posts wi...

This Week In Cybercrime: Black Hat Edition: The...

spectrum.ieee.org 27 Jul '12, 9pm

How secure do you feel about the wireless router you use at home? Maybe more than you should. Researchers at AppSec Consul...

Security incident w/severe losses at BTC-e rede...

btc-e.com 31 Jul '12, 12am

Trading in automatic mode. Addition USD deposits within 24 hour Instant deposit/withdrawal all coin USD Withdrawal within ...

Push the bed against the door! #Blackhat finds ...

eetimes.com 23 Jul '12, 10pm

SAN JOSE – Security experts will show vulnerabilities in everything from ARM processors to x86 CPUs and even hotel locks a...