Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

These were the best hacks at Black Hat and Def Con this year

1 of 8 NEXT PREV
  • Famed car hackers hijack a Jeep (again)

    Famed car hackers hijack a Jeep (again)

    If you thought your car wasn't safe the first time around, famed car hackers Charlie Miller and Chris Valasek have once again shown that it's really not. Although this new hack requires physical access to the target Jeep, the team said that other, more remote methods could be used -- and a determined hacker wouldn't have any problem installing one.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: Charlie Miller/YouTube

    Caption by: Zack Whittaker

  • This ATM hack could allow thieves to make off with thousands

    This ATM hack could allow thieves to make off with thousands

    Anyone in the US knows the pain of chip-and-PIN, the new debit and credit card payment system, after months of bungled rollouts and bad implementations. So here's the worse news: it's not as secure as you might think. A hacker can easily withdraw up to $50,000 from an ATM machine in just 15 minutes, even though card chips are meant to be more secure. The cost of the hack involves a steep investment of about $2,000 worth of equipment though.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: file photo

    Caption by: Zack Whittaker

  • Quadrooter flaws affect most Android devices

    Quadrooter flaws affect most Android devices

    Another day, another major Android vulnerability. This time, the software that Qualcomm ships with Android phones which is used to connect its chips and hardware to the rest of the phone is to blame. Over 900 million phones and tablets are said to be at risk. Though most of the flaws have been patched, the last outstanding fix won't be issued until early September.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • Samsung Pay used for fraudulent payments

    Samsung Pay used for fraudulent payments

    A security researcher has figured out how to steal the payment tokens used in Samsung Pay to make in-store contactless purchases using social engineering methods. Once those tokens are loaded into other hardware, the hacker can make fraudulent transactions. Samsung denied this was a problem, indicating that it wouldn't fix the issue, much to the chagrin of the security community.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: Salvador Mendoza/YouTube

    Caption by: Zack Whittaker

  • Severe vulnerabilities discovered in internet protocol

    Severe vulnerabilities discovered in internet protocol

    You know it's not going to be a good day when high-profile vulnerabilities threaten the security of over 85 million websites. But that's exactly what happened when researchers discovered four separate flaws in HTTP/2, the new internet protocol, used by nearly one-in-ten websites. The bugs could be used to crash servers and conduct slow-read attacks.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: file photo

    Caption by: Zack Whittaker

  • Apple talks iOS security, announces bug bounty

    Apple talks iOS security, announces bug bounty

    After a tumultuous ride with the FBI earlier this year, Apple took to Black Hat to show off how strong its iPhone and iPad security is, in one of the first ever in-depth talks on the subject. The company also announced a bounty of up to $200,000 for high-severity bugs, but that was quickly upped by one private company offering more than double that.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: CNET/CBS Interactive

    Caption by: Zack Whittaker

  • Fake boarding pass app gets hacker into airline lounges

    Fake boarding pass app gets hacker into airline lounges

    The head of Poland's cyber response team flies dozens of times a year, so he knows his airport lounges well. On one recent trip, he figured out how to bypass the QR code reader to get access, even if he gets rejected (which on one embarrassing occasion, he did). It's not a perfect system, but it does highlight the fragility of boarding pass security.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: Przemek Jaroszewski/YouTube

    Caption by: Zack Whittaker

  • This $500 "danger drone" is a flying hacker's laptop

    This $500 "danger drone" is a flying hacker's laptop

    Some hacks are more difficult to carry out than others. Some require getting physically close to a network. When all else fails, strap a laptop to a drone and fly it in. That's exactly what one hacker did. Billed as a drone that "does everything a hacker laptop can do, but one that can fly," it has a 1.2 mile range and can be controlled over the LTE network.

    Black Hat 2020

    • New EtherOops attack takes advantage of faulty Ethernet cables
    • How hackers gain root access to SAP enterprise servers through SolMan
    • How your pacemaker could become an insider threat to national security
    • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
    Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

    Photo by: Bishop Fox/Danger Drone

    Caption by: Zack Whittaker

1 of 8 NEXT PREV
Zack Whittaker

By Zack Whittaker for Zero Day | August 12, 2016 -- 16:23 GMT (09:23 PDT) | Topic: Security

  • Famed car hackers hijack a Jeep (again)
  • This ATM hack could allow thieves to make off with thousands
  • Quadrooter flaws affect most Android devices
  • Samsung Pay used for fraudulent payments
  • Severe vulnerabilities discovered in internet protocol
  • Apple talks iOS security, announces bug bounty
  • Fake boarding pass app gets hacker into airline lounges
  • This $500 "danger drone" is a flying hacker's laptop

Weren't in Vegas for the heat and hacking? Here's what you need to know.

Read More Read Less

Famed car hackers hijack a Jeep (again)

If you thought your car wasn't safe the first time around, famed car hackers Charlie Miller and Chris Valasek have once again shown that it's really not. Although this new hack requires physical access to the target Jeep, the team said that other, more remote methods could be used -- and a determined hacker wouldn't have any problem installing one.

Black Hat 2020

  • New EtherOops attack takes advantage of faulty Ethernet cables
  • How hackers gain root access to SAP enterprise servers through SolMan
  • How your pacemaker could become an insider threat to national security
  • Top 6 cybersecurity trends to watch for at Black Hat USA 2020 (TechRepublic)
Published: August 12, 2016 -- 16:23 GMT (09:23 PDT)

Caption by: Zack Whittaker

1 of 8 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
Zack Whittaker

By Zack Whittaker for Zero Day | August 12, 2016 -- 16:23 GMT (09:23 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums