Ppt on bluetooth hacking device

Yr 11 Mock Revision List Uses of different software packages DTP software Data, information and knowledge Bluetooth, GIS and Internet Connections Online.

these are degrees centigrade, then the data becomes INFORMATION Data given understanding is knowledge Data + Meaning = Information Bluetooth Wireless technology that allows devices to share files e.g. music, videos, pictures Connect phones to phones, to head sets, to speakers/ including wirelessly BUT speeds vary according to other local usage and distance from the exchange Greater risk of hacking due to being permanently on Online Shopping Almost anything can be bought online nowadays Think about your own /


Session 23 Auditing Blackberrys and other PDAs. ©2005 Lucent Technologies Auditing Blackberrys and Other PDAs (Handheld Devices) Session Number 23 George.

assessment of customized software code ©2005 Lucent Technologies How about an “Ethical Hack”? l Validates the risk – Exploit the identified vulnerabilities Likely to identify /device infrastructure managed? – Logging, monitoring, maintained, operated? – Commissioning and de-commissioning – BES/Good Infrastructure – Handheld devices – User’s PC ©2005 Lucent Technologies Audit Checklist (Connectivity) l Reviewing the connectivity options: – Over The Air (OTA) provided by the carrier – USB/Serial – Bluetooth/


All about Android tablets and phones Presenter: Alexandru Savu Mobile device trainer.

the user is not protecting it with a password/pattern lock and if the software is not up to date; Once the device is hacked, everything within, including private documents, notes of accounts, credit cards details, etc. will be in wrong hands. Conclusion / dont have to be at your computer for that, it goes over the Internet Finally, use your smartphone to control your home/office via Bluetooth or Wi-Fi: control the lights, TV, music, air-con, move data between computers with a simple tap on the phone Fact: /


Networks : What is a network?

Fi which uses radio waves to transmit data through the air. Wi-Fi can connect devices up to 100m apart and transfer data at a rate of 60Mbps. Bluetooth is another wireless network standard which uses short wavelength microwaves to transmit data. It is / Local will be much faster and is NOT limited by the speed of the user’s internet connection. Security concerns about hacking into online cloud storage. Users may prefer an initial payment to purchase hardware and software rather than subscribing to a monthly /


The Payment Device – An Exploration Into New Technologies and Methodologies Chris Lomax Head of Marketing - EMEA.

on Security - Contactless Solutions - Internet Communications - SEPA - Next Generation Consumer Devices Agenda 3 Focus on Security Sources of Point of Card Fraud  Card Fraud  Transaction logs and database hacksDevice and line tapping  Data Communications 4 Card Fraud  Protecting Customers In 2005 /4G Bandwidth WI-FI WIMAX 3G - EDGE/WCDMA/CDMA2000 1x EV 2.5G - GPRS/CDMA2000 1X 2G - GSM/CDMA/TDMA Bluetooth 100 10 1 0.1 0.01 (Mb/s) Mobility 0.010.1110100 (Km) Metropolitan Area Network (MAN) Personal Area/


Hacking Web File Servers for iOS Bruno Gonçalves de Oliveira Senior Security Consultant – Trustwave’s SpiderLabs.

MSc Candidate Computer Engineer Offensive Security Talks: Silver Bullet, THOTCON, SOURCE Boston, Black Hat DC, SOURCE Barcelona, DEF CON, Hack In The Box Malaysia, Toorcon, YSTS e H2HC. Hosted by OWASP & the NYC Chapter INTRO Smartphones –A LOT OF /Hosted by OWASP & the NYC Chapter What are those apps? Designed to provide a storage system to iOS devices. Data can be transferred utilizing bluetooth, iTunes and FTP. Easiest way: HTTP protocol. They are very popular. Examples Features Manage/Storage files /


1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.

) Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 20 How Hackers Gain Access Direct access – –Hacking software Indirect access – –Internet connection – –Logical ports Copyright © 2012 Pearson Education, Inc. Publishing as Prentice /Inc. Publishing as Prentice Hall 22 Bluetooth Attacks Bluesnarfing – –Exploits flaw in access software to steal information contained on the device Bluebugging – –Hacker takes control of the device Make your device invisible Copyright © 2012 Pearson Education,/


Hacking Joshua Lackey, Ph.D.. Background Ph.D., Mathematics. University of Oregon. 1995 – 2000 Senior Ethical Hacker. IBM Global Services. 1999 – 2005.

more work must be performed. Answer The goal of any penetration test or ethical hack is to determine the truth. Truth Is what we believe, what we have /. Daughterboards DBSRX – satellite TV tuner –Receive frequencies from 800MHz to 2.5(+)GHz GSM CDMA Bluetooth 802.11 Hydrogen (Radio Astronomy) Etc, etc, etc. Wireless Communication Security Software Radio –Cheap hardware/ Fob FFT Signal Search VW Key Fob FCC ID Search –Get FCC ID from device. –Grantee code is first three letters. VW Key Fob: NBG –Frequency is/


Lon Kastenson Security of Mobile Devices. Overview Types of attacks Security in Android Security in iOS Security in other mobile platforms Current protocols.

will double since last year. Popular attacks remain Trojan Horses and Social Engineering hacks. Overview: Present Trojan Horse (Most popular, evident in Android Market Attack/-your-phone-steal-your-data-and-open-backdoor/ Direct Install (Trojan) Bluetooth MMS message Memory card File Injection Other methods? Propagation Methods iOS tracking/ Weak sandbox Vulnerable applications a threat Closed source approach Jailbroken devices iOS Security Issues Capability Model Process Identity Data Caging Certification /


Phones BY KURTIS WORTHINGTON. The first phones This history focuses on communication devices which connect wirelessly to the public switched telephone.

and app stores. Software Entertainment - cameras, web browsers, music players Entertainment Connectivity - the common ways of connecting your device, from Bluetooth to 4G. Connectivity Impacts of technology  In the uses of Modern technology is simply an advancement of old technology, / by nature who need real life connections, this runs the risk of becoming a huge problem for society. HackingHacking=A hacker may break into a system just out of curiosity or for the challenge - can they get through/


IST 210 Is “Secure Database” an Oxymoron. IST 210 2 New technology We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager.

We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager devices Networks are extending a DBMSs functionality This can have unintended, and often negative consequences IST 210 3 Bluetooth Becoming pervasive Acura, BMW and Daimler-/ showing some of the symbols and their meanings The objectives? Free Internet access, mostly Corporate or entity LAN hacking, sometimes Stealing service – for example, hijacking someone’s MAC address at Starbucks VoIP eavesdropping IST 210 7/


Car Hacking Patrick, James, Penny.

Not an Outline Internal Structure Exploits ECUs Controller Area Networks Seed to Key Algorithms Device Control Exploits Testing Methodology Attack Strategies Attack Results Why is car hacking bad? Control car components remotely Physical implications Privacy concerns You won’t know about/ unlocked when going more than 5 MPH Issues Required (almost) physical access to car via OBD-II port Bluetooth Wireless Tire Pressure Sensors Given physical access an attacker could Cut breaks Set fire to car Place bomb in /


How to Hack your Faith Modern ideas to “walk in the Spirit and you shall not fulfill the lusts of the flesh.” (Galatians 5:16)

walk! It’s time to let it improve our Christian walk! STEP #1: GET A DEVICE. iPhone / Smartphone Always with you Can stream even without WiFi Can be pricey without contract iPod/Store2. Search for “Bible” 3. Click and install. STEP #3: DECIDE HOW TO LISTEN Ear Buds Wireless Speaker Bluetooth Earpiece A2DP Car Stereo Cassette Adapter STEP #4: DECIDE WHERE TO START. Most start at beginning: Gen  Ex / Free Bible college hack Become a Bible answer man Put a pastor in your living room. www.geekychristian.com


Mobile Threats and Attacks

Encryption, don’t cache sensitive data Disable unnecessary device features such as Wi-Fi, Bluetooth, and infrared when they aren’t in use. Enabling the firewall, disable sharing Best practices protecting mobile device from potential threats Isolate personal apps and corporate apps/ be viewed;  If the phone is connected via a VPN, company networks will be exposed to malware or could be hacked. Americans lost about $30 billion worth of mobile phones last year.  Phones may be lost anywhere and anytime. Nearly/


MOBILE DEVICE MANAGEMENT IN THE REAL WORLD! JOE ATNIP, CONCEPT TECHNOLOGY INCORPORATED JAMES BOCK, COMMUNITY BANK & TRUST JUDY LONG, FIRST CITIZENS NATIONAL.

USERS FROM MOVING EMAILS BETWEEN ACCOUNTS AND RESTRICT 3 RD PARTY APPS FROM SENDING EMAILS DETECTION OF JAIL BROKEN AND ROOTED DEVICES COMPLIANCE REPORTING SECURE BROWSING A GOOD SOLUTION WILL PROVIDE: URL FILTERING BASED ON CATEGORIES AND INCLUDE THE ABILITY TO CUSTOMIZE /SOURCES 4. BACK UP YOUR DATA 5. KEEP YOUR SYSTEM UPDATED 6. DO NOT HACK (JAIL-BREAK) YOUR DEVICE MOBILE BEST PRACTICES (CONTINUED) 7. TURN OFF WI-FI AND BLUETOOTH SERVICES WHEN NOT IN USE 8. DO NOT AUTOMATICALLY CONNECT TO WI-FI HOT SPOTS /


ISMS for Mobile Devices Page 1 ISO/IEC 27001 Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.

50, Low 10) Priorit y (High, Mediu m, Low) Risk Treatment 1 Mobile device victim of "hacking defaults" because the default settings were not changed 0.550210HighT1: Change Defaults ISMS Mobile Risk /Device T13: Proper use of Geotagging ISMS for Mobile Devices Stacy (Dene’) Nelson Student ID #000221918Page 17 Systems Security – 26 Risk Treatments for Mobile Devices – page 2 T14: Retrieval of Information - Lost or Forgotten Passwords T15: Safeguarding Mobile Data T16: Secure Bluetooth T17: Secure Mobile Device/


IoT; Impact on the Network Gary Audin #806. What You Will Learn What is the Internet of Things (IoT) How will IOT be used Candidates devices Networks.

org/ IEEE P2413 http://standards.ieee.org/develop/project/2413.html http://standards.ieee.org/develop/project/2413.html Wi-Fi Bluetooth “IoT Standards: Many, Not One” http://www.nojitter.com/post/240169489/iot-standards- many-not-one” http://www./attack using 100,000 home routers, multi-media devices, televisions, and at least one refrigerator. 25% of the devices hacked were home appliances 750,000 malicious e-mails sent IoT Data Processing Edge device with remainder at data center Cloud service with service/


Android on Legacy Devices It or Lose It?

when a camera takes a photo - NFC supports large payloads over bluetooth - WIFI/WIFI-Direct service discovery - Large, detailed, multi-action notifications - Input manager allows you to query input devices 4.0.x - Low-level streaming multimedia (Khronos OpenMAX AL -/from app “LEGO DEVELOPERS” pressure USER PRESSURE SUPPORT NEW UP-TO DATE DEVICES OR HACK DEPRECATED ONES TO GET LATEST ANDROID “WORKING” USER FEEDBACK LATEST ANDROID ON LEGACY DEVICES IN LAST 3 YEARS SLOW UI SLOW GAMES NO MULTITASKING LOW FREE /


By Alexander Pritchard 1)Radio frequency identification. 2)Get it from any device and always there for if you need it. 3)Could be a bad connection, could.

send it to. Disadvantage:-  Sometimes the internet might be down so you cant send them.  You could get hacked and your email could be changed.  The recipient needs access to the Internet to receive email.  Viruses are easily/300gbps.  Max range = 100m.  Benefits = signal does not degrade over long distances.  Limitations = device must be I the line if sight & is affected by weather.  E.G:- Bluetooth.  Data is transmitted from the earth to a satellite which relays it back to another station on earth./


FootprintingScanningEnumeration Hacking Gaining Access Privilege Escalation Hiding Files Cover Tracking.

Attack Keylogger Spyware Trojan Donanımsal Keylogger PC/BIOS EmbeddedKeylogger Keyboard External Keylogger PS/2-USB Keylogger Wi-Fi Keylogger Bluetooth Keylogger Yazılımsal Keylogger Application KeyloggerKernel KeyloggerRootkit Keylogger Sniffing MITM (MAN IN THE MIDLE) Bilgi Toplama Şifre Tahmin Discover Devices Gain Access Take Control Automated Exploitation Manuel Exploitation Command Shell Session Meterpreter Session Manuel Authentication Yetki Yükseltme Rootkit ADS/


Hacking Windows CE

Hacking Windows CE /test.asm - the final shellcode –get_export_section –find_func –function implement of the shellcode It will soft reset the PDA and open its bluetooth for some IPAQs(For example, HP1940) Part 5/8 Shellcode(2) Something to attention while writing shellcode –LDR pseudo-instruction "ldr/in Windows CE Because of instruction cache, the decoding shellcode is not good enough Internet and handset devices are growing quickly, so threats to the PDAs and mobiles become more and more serious The patch/


By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?

CELL PHONE GPS: SAFETY OR STALKING DEVICES? Privacy and Anonymity SOCIAL/ETHICAL CONCERNS /Points  Wireless access points allow cell phones to connect to a wired network using Wi-Fi or Bluetooth. WAPs perform modulation, which is the transfer of data in or out of the access point./ can track their employees without their knowledge.  Spouses can track spouses without their knowledge.  Stalkers can hack or install an app to get the location of a user without their knowledge. SOCIAL AND ETHICAL ISSUES /


CSCI 6361: Topics in Mobile Computing Dept. of Computer Science University of New Orleans Fall 2004 Dr. Golden G. Richard III.

intervention to fix Prevalent network protocols require work to give good performance for wireless –Schemes for mobility –TCP hacks Schemes for intelligent handoff between network interfaces –Tradeoffs between cost, bandwidth, availability Slides © Prof. Golden G/© Prof. Golden G. Richard III, Department of Computer Science, University of New Orleans, 2004 78 Bluetooth Security (2) Each Bluetooth device: –48 bit 802-style unique identifier –128 bit private authentication keys –8 to128 bit private encryption /


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband & Wireless Digital Mobile Communication Telephony Internet & WWW Broadband & Wireless Digital.

with over 150 members worldwide. G Bluetooth focuses on connectivity between large packet user devices--laptops, phones, major peripherals…. G ZigBee is designed to provide highly efficient connectivity between small packet devices. G ZigBee G The set of /Encryption types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected /


Unit 4 Networks. Computer Networks A computer network is a collection of computers linked together so that they can communicate with each other A computer.

data to other Bluetooth devices such as desktop or notebook computers, input devices, PDAs, scanners, printers, and even mobile phones Connect with up to seven other Bluetooth devices at a time. Connect with up to seven other Bluetooth devices at a time./ Hardware Range of User needs Range of User needs Future proofing Future proofing Security strategies Threats: Hacking Hacking Spreading viruses Spreading viruses Deliberate or accidental destruction of data Deliberate or accidental destruction of data Data/


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband etc. Telephony Internet & WWW Broadband etc.

with over 150 members worldwide. G Bluetooth focuses on connectivity between large packet user devices--laptops, phones, major peripherals…. G ZigBee is designed to provide highly efficient connectivity between small packet devices. G ZigBee G The set of /Encryption types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected /


Broadcast Technology RTV 151 Telephony Internet & WWW Broadband & Wireless Digital Mobile Communication Telephony Internet & WWW Broadband & Wireless Digital.

, with over 150 members worldwide. G Bluetooth focuses on connectivity between large packet user devices--laptops, phones, major peripherals…. G ZigBee is designed to provide highly efficient connectivity between small packet devices. Smart Home video G ZigBee and / types G WEP -- Wired Equivalency Privacy G easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere G WPA -- Wi-Fi Protected/


How to secure the Internet of Things?

, and attack against German steel factory). Risk analysis is often complex since hacked devices may be used for further attacks. Hence, indirect consequences also need to be taken into account. Examples: hacked Femto home router used for spying, DDoS attacks using SNMP (used in/WiFi uses IEEE 802.11i/802.1X with EAP to offer authentication and wireless link security at the link layer. Bluetooth Smart defines a pairing procedure and link layer security. In rare cases additional security is added on top of the/


NETWORK SECURITY. INTRODUCTION Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However,

their products as friendly as possible – when you plug the device it starts working right away, usually with no security by default. Several ways wireless nets handle security  802.11i  Bluetooth  WAP 2.0 WIRELESS SECURITY: 802.11 SECURITY IEEE/instructions for how to remedy them. This method has been in use from the early days of computers. ETHICAL HACKING: Goals Hack your systems in a non destructive fashion Enumerate vulnerabilities and if, necessary, prove to upper management that vulnerabilities /


Unit 4 Networks. Computer Networks A computer network is a collection of computers linked together so that they can communicate with each other A computer.

user to effortlessly transfer data to other Bluetooth devices such as desktop or notebook computers, input devices, PDAs, scanners, printers, and even mobile phones. Connect with up to seven other Bluetooth devices at a time. Broadband and wireless networking/Hardware Range of User needs Range of User needs Future proofing Future proofing Security strategies Threats; Hacking Hacking Spreading viruses Spreading viruses Deliberate or accidental destruction of data Deliberate or accidental destruction of data /


Wireless Sensor Systems: Security Implications for the Industrial Environment Dr. Peter L. Fuhr Chief Scientist RAE Systems, Sunnyvale, CA

infrastructure flexibility once implemented Lack of analysis tools ISA Wireless Security, P. Fuhr 16 Technology Group: Key Issues Security –Jamming, hacking, and eavesdropping Power Value (clear to customer) Interoperability –Co-existence with other facility networks, sensors, collectors, technology True engineered /Voice Channel ZigBee (proposed) 2.4 GHz,DSSS 15 chips/bit 40 kbits/s 0dBm 100m 100s devices, CSMA/CA Not yet No Bluetooth – aka IEEE 802.15.1 ZigBee – aka IEEE 802.15.4 ISA Wireless Security, P/


Introduction to Cybersecurity & Information Assurance for FQHCs April 13, 2011 Amelia Muccio Director of Emergency Management

IDS can search for attacks, terminate connections, send real time alerts, protect system files, expose hacking techniques, illustrate vulnerabilities and even assist in tracking down hackers Common Types of IDS Host based-mail/) broadcasting Default SSID Radio frequency management Default settings Authentication Bluetooth security Access Point Mapping WLAN version of wardialing An AP is a device connecting a wired network to wireless devices using radio frequency Software (net stumbler, air snort, /


Overview digital media.... Discussion -- revisit theory What does ‘the media’ refer to? Press, cinema, broadcasting, etc.) The ‘new media’ as a term?

Bluetooth. Other Wireless Technologies Bluetooth Name comes from Harald Bluetooth, king of Denmark in the late 900s There are lots of different ways that electronic devices can connect to one another--Component cables, Electrical wires, Ethernet cables, WiFi, Infrared signals… Bluetooth/ types WEP -- Wired Equivalency Privacy easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere WPA -- Wi-/


Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 1-1© 2007 Prentice-Hall, Inc ELC 200 Day 10.

Second layer, is the baseband, which with a radio and an antenna makes up the physical transmission component of a Bluetooth device Link manager protocol (LMP) is a Bluetooth layer that sets up ongoing link management with Bluetooth devices –Piconet management –Link configuration –Security functions Hacking of Bluetooth is called War Nibbling and bluecasingWar Nibbling bluecasing 6-13 © 2007 Prentice-Hall, Inc Personal Area Networks (PANs) Connect/


Make sure you understand

disks, disk drives, or power failures, lost by accidentally deleting or overwriting files lost or become corrupted by computer viruses, hacked into by unauthorised users and deleted or altered destroyed by natural disasters, acts of terrorism, or war. deleted or altered by/high definition. It is used for computers, TVs and things like games consoles. Infra-Red - A bit like Bluetooth you but the two devices connecting together have to be close next to each other. It is really slow. It’s an old technology now/


More on digital media.... First -- creative shooting/editing Check YouTube -- note when to follow advice and when they’re not so good Sample 1 / Sample.

. Bluetooth focuses on connectivity between large packet user devices--laptops, phones, major peripherals….ZigBee is designed to provide highly efficient connectivity between small packet devices. Developing Technologies WPAN Wireless personal area network Bluetooth and/Encryption types WEP -- Wired Equivalency Privacy easily hacked -- do a ‘Cracking wi-fi’ or cracking WEP search on YouTube Wireless Hacking / WEP hacking / Free wi-fi anywhere Wireless Hacking WEP hacking Free wi-fi anywhere WPA -- Wi-Fi/


Lets test YOUR knowledge!

Management Information System. Discuss how the above threats can be prevented. Answer Answer: Computer Virus Worm Trojan Horse Phishing Adware Hacking Denial of Service Attack Physical Threats Data Protection Act Question: What are the 8 principles of the Data Protection Act? /high definition. It is used for computers, TVs and things like games consoles. Infra-Red - A bit like Bluetooth you but the two devices connecting together have to be close next to each other. It is really slow. It’s an old technology/


Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1.

nodes, down to <<10KB memory/100KB code ZigBee Alliance created ZigBee IP that uses IPv6 and 6LoWPAN Bluetooth SIG and IETF worked on IPv6 over BTLE (Bluetooth Smart) IP-based alliances expanded (AllSeen, IPSO, OIC, OMA, Thread, etc.) And of course the/attack against German steel factory).DragonFlyattack against German steel factory Risk analysis is often complex since hacked devices may be used for further attacks. Hence, indirect consequences also need to be taken into account. Examples: DDoS attacks using/


Computer Security for the Appropriately Paranoid A Broad Overview Joseph Kashi, MS, JD.

and model, with upgraded firmware Hardware Firewall Adds some protection against hacking through the wired Internet connection Adds some protection against hacking through the wired Internet connection Generally useful and unobtrusive unless using VPN/ Protecting Bluetooth Part 4 Use only trusted devices Use only trusted devices Turn off device pairing mode Turn off device pairing mode Protecting Bluetooth Part 5 Bluetooth headsets should use broadband mode and then turn off pairing mode Bluetooth headsets/


Unit 4 ICT A level Revision. Remember!! The focus of A level questions is on you being the designer / advisor to organisations wishing to develop their.

may have different priorities e.g. A large business organisation may be primarily concerned with –Prevention of hacking –Avoid viruses –Secure payment site A school may be equally concerned with blocking the downloading of illicit material/the user to effortlessly transfer data to other Bluetooth devices such as desktop or notebook computers, input devices, PDAs, scanners, printers, and even mobile phones. Connect with up to seven other Bluetooth devices at a time. Broadband and wireless networking /


By John Rodriguez COSC 356 SEC 001 22 April 2015 Wireless Network Attacks.

to the overreliance of embedded computer systems in an automobile, hacking of an automobile has become a new threat. Software controls breaking (ABS), steering (auto-parking), dash devices (built-in GPS), accelerator (cruise control), etc.. Ways to accomplish this: Hardwire connection through the On-Board Diagnostic system Bluetooth connection on newer model cars External media (viruses implanted on CDs, USB) CNET Report In/


Internet of things My T. Thai

to Google Hangout chats and Facebook conversations. Bluetooth communication between most Smart watches and Android devices relies on a six digits PIN. Easy to crack with a brute-force attack. Mitigate the attack with NFC pairing procedure in pin code exchange or the use of passphrases. Hacking wearable devices Under attack Hacking Smart meters Smart meters can be hacked to hit the National power network In/


“ I C T a d v i s o r y s e r v i c e s ” “ I C T a d v i s o r y s e r v i c e s ” Current Strategies for protecting the ICT Infrastructure,

high- end smart phones. Some of these are listed below: - Bluebugging - Refers to hacking into a Bluetooth device and using the commands of that device without notifying or alerting the user. By blue bugging, a hacker could eavesdrop on phone conversations/send and receive text messages, and even connect to the Internet. - Bluebugging - Refers to hacking into a Bluetooth device and using the commands of that device without notifying or alerting the user. By blue bugging, a hacker could eavesdrop on phone /


NATIONAL 4 & 5 COMPUTING SCIENCE Prepared by M Feldman.

service. Security concerns about possibility of hacking of important data. HARDWARE Backing Storage Devices Backing Storage Devices include devices such as:  Hard Drives  CD / DVD Drives  Magnetic Tape Drives  USB Flash Drives Backing Storage devices are needed to store data because /Describe two types of transmission medium and give an advantage for each. 6.Explain what WiFi is. 7.Explain what Bluetooth is. 8.What is bandwidth? 9.Give three advantages of using a LAN. 10.Which has the higher bandwidth/


Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9.

Second layer, is the baseband, which with a radio and an antenna makes up the physical transmission component of a Bluetooth device Link manager protocol (LMP) is a Bluetooth layer that sets up ongoing link management with Bluetooth devices –Piconet management –Link configuration –Security functions Hacking of Bluetooth is called War Nibbling and bluecasingWar Nibbling bluecasing 6-24 © 2007 Prentice-Hall, Inc Personal Area Networks (PANs) Connect/


Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 8 Wireless Network Security.

, Fourth Edition4 5 Table 8-1 Bluetooth products Wireless Attacks (cont’d.) Piconet –Established when two Bluetooth devices come within range of each other –One device (master) controls all wireless traffic –Other device (slave) takes commands Active slaves can/transmissions from users to evil twin AP –http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html –Hacking Facebook, Twitter, etc. http://www.youtube.com/watch?v=9T8xaDoYNmg –Detecting Firesheep – ‘Blacksheep’ - /


Broadband/Wireless for Peadar Transmission Theory What happens between the time that a signal begins to propagate down a wire and the time that it reaches.

lines -> 1.900.000 –Mobiles -> 3.800.000 Bluetooth Bluethooth –Cable Nightmare –Solution? Bluetooth –…open standard for short range voice and data communication –…short-range radio connection between devices –…wireless comunication with a difference –…name was chosen to hightlight/going through a firewall filter 802.11 Security Wired Equivalent Privacy (WEP) –Software that automates the hacking process is widely available Locate vulnerable access points by driving around (war driving) Collecting traffic and/


Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.

a public place allows an intruder access  Hacker simply downloads software onto a laptop (available free on the web)and adds a Bluetooth antenna  Next slide gives examples of Bluetooth hacker activities  “Bluesnarfing” - downloading any and all information from a hacked device (for example, address book information, photos, calendars, SIM card details)  Hacker could send a “corruption code” and completely shut down the phone/


Ads by Google