The 10 scariest hacks from Black Hat and Defcon

Status
Not open for further replies.
I

illumination

Thread author
Researchers showed all manner of serious attacks on everything from browsers to automobiles..
Read More
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Spy Drone since its not an ordinary drone that moving around and nothing to do but as stated on that site;

It can crack codes and pick off cell phone calls, and an on board computer that can execute a flight plan.

One day you might not know there is a drone revolving around.
 
I

illumination

Thread author
jamescv7 said:
Spy Drone since its not an ordinary drone that moving around and nothing to do but as stated on that site;

It can crack codes and pick off cell phone calls, and an on board computer that can execute a flight plan.

One day you might not know there is a drone revolving around.

That and the powerline device takeover, are both scary to think about! Where a thief can monitor you house alarm or security systems to determine if your even home, and disable them to gain access..
 

HeffeD

Level 1
Feb 28, 2011
1,690
thewolfsmith72 said:
That and the powerline device takeover, are both scary to think about! Where a thief can monitor you house alarm or security systems to determine if your even home, and disable them to gain access..

This could obviously only work with certain types of alarm systems.

If you have an old school, no-frills alarm only system, (or a so-called dumb system) any sort of monitoring isn't going to be able to gain any information. They could possibly try and disrupt your sensors, as most of these are wireless, but even the dumb systems are supervised. In alarm system lingo, supervised means the alarm system is actively monitoring the connection with the sensor. If a sensor goes down, the alarm will be triggered. No sensor is as good as an open sensor. Cutting the power will not help either, as any alarm system worth using has battery backup, and can still trigger a silent alarm (dial the police) if the power is out.

But if you have a newer system (smart system) that has all the bell and whistles that people are coming to expect, (tied in with a home automation system) they could glean information from it. Similar to sniffing Wi-Fi.
 
I

illumination

Thread author
HeffeD said:
thewolfsmith72 said:
That and the powerline device takeover, are both scary to think about! Where a thief can monitor you house alarm or security systems to determine if your even home, and disable them to gain access..

This could obviously only work with certain types of alarm systems.

If you have an old school, no-frills alarm only system, (or a so-called dumb system) any sort of monitoring isn't going to be able to gain any information. They could possibly try and disrupt your sensors, as most of these are wireless, but even the dumb systems are supervised. In alarm system lingo, supervised means the alarm system is actively monitoring the connection with the sensor. If a sensor goes down, the alarm will be triggered. No sensor is as good as an open sensor. Cutting the power will not help either, as any alarm system worth using has battery backup, and can still trigger a silent alarm (dial the police) if the power is out.

But if you have a newer system (smart system) that has all the bell and whistles that people are coming to expect, (tied in with a home automation system) they could glean information from it. Similar to sniffing Wi-Fi.

You have a point there, with the battery operated back ups, had not thought of that..
Still, it could be to their advantage with certain systems such as the one you mentioned..
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top