{"id":3203,"date":"2016-09-05T11:12:26","date_gmt":"2016-09-05T15:12:26","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3203"},"modified":"2016-09-05T11:12:26","modified_gmt":"2016-09-05T15:12:26","slug":"hacker-wisdom-top-three-takeaways-from-black-hat-2016","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/05\/hacker-wisdom-top-three-takeaways-from-black-hat-2016\/","title":{"rendered":"Hacker Wisdom: Top Three Takeaways from Black Hat 2016"},"content":{"rendered":"<p><a href=\"http:\/\/thevarguy.com\/information-technology-events-and-conferences\/hacker-wisdom-top-three-takeaways-black-hat-2016\">http:\/\/thevarguy.com\/information-technology-events-and-conferences\/hacker-wisdom-top-three-takeaways-black-hat-2016<\/a><\/p>\n<p>I was curious on what this year\u2019s Black Hat conferences were all about, other than a bunch of people getting together in numerous seminars and presentations for about a week, so here are \u201cThe Top Three Takeaways from Black Hat 2016\u201d by Allison Francis from The Var Guy.com.<\/p>\n<ul>\n<li>Would you pick up a random USB drive and plug it into your personal computer?<\/li>\n<\/ul>\n<p>Google researcher Elie Bursztein explains the enduring theory among cybersecurity experts that people will pick up and use random USB thumb drives that they find, and potentially take the risk of infecting their systems, which is not a rare case among unaware computer users all over.<\/p>\n<p>Bursztein and his team had distributed 297 USB drives as \u201cbait\u201d at various strategic-ish locations, such as parking lots, building hallways, classrooms and outdoor areas around the University of Illinois campus.<\/p>\n<p>He added that each drive houses tracking software that would \u201ccall home\u201d if plugged in. those drives also included several different messages like \u201cfinal exam results,\u201d or \u201cconfidential,\u201d among others.<\/p>\n<p>The results were issued by eWeek (<a href=\"http:\/\/www.eweek.com\/security\/black-hat-do-usb-keys-left-in-parking-lots-get-picked-up.html\">article<\/a>), revealing a stoning 46 percent of the distributed drives \u201cphoned home\u201d, so Bursztein suggested that awareness and security training is highly important, and warned organizations and individuals to be mindful of what they plug into their machines. \u201cYou don\u2019t pick up food from the floor and eat it because you may get poisoned\u201d, so don\u2019t pick up random USB drives either,\u201d Bursztein said.<\/p>\n<ul>\n<li>The mounting threat of attacks in the VoIP and UC space<\/li>\n<\/ul>\n<p>Fatih Ozavci, a managing consultant with Context Information Security, presented the lack of understanding and awareness of modern voice over internet protocol (VoIP) and unified communications (UC) security. This gap leaves providers and organizations extremely vulnerable to attacks, due to the ever-increasing and rapidly-growing number of threats.<\/p>\n<p>During the conference Ozavci mentioned the various awareness that services providers and business are leaving themselves at risk to threat actors repurposing and exposing infrastructure for attacks such as botnets, malware distribution, vishing, denial of service attacks and toll fraud.<\/p>\n<p>Also Ozavci touched on the weaknesses in messaging platforms and IC products suites since those vulnerabilities make it easy for hackers to sneak past security measures and spread malicious content. Once those vulnerabilities are exploited, attackers could gain unauthorized access to client systems or communications services such as conference and collaboration, voicemail, SIP trunks and instant messaging.<\/p>\n<p>Last, Ozavci presented awareness and how he planned to get the word out and revealed his newly developed open sources tools <a href=\"http:\/\/www.viproy.com\/\">Viproxy<\/a> and <a href=\"http:\/\/www.viproy.com\/\">Viproy<\/a> which can be used for VoIP penetration testing.<\/p>\n<ul>\n<li>Information sharing and public work<\/li>\n<\/ul>\n<p>Dan Kaminsky, the co-founder and chief technologist of the cybersecurity firm White Op highlighted the importance of making the internet a safe place for everyone by calling for more information sharing as a way to improve security and deal with and combat cyberthreats faster and more efficiently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/thevarguy.com\/information-technology-events-and-conferences\/hacker-wisdom-top-three-takeaways-black-hat-2016 I was curious on what this year\u2019s Black Hat conferences were all about, other than a bunch of people getting together in numerous seminars and presentations for about a week, so here are \u201cThe Top Three Takeaways from Black Hat 2016\u201d by Allison Francis from The Var Guy.com. Would you pick up a random [&hellip;]<\/p>\n","protected":false},"author":11510,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3203","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11510"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3203"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3203\/revisions"}],"predecessor-version":[{"id":3204,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3203\/revisions\/3204"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}