Top 10 Security Issues Revealed in 2014 Blackhat Conference(1)

Hackers always present their amazing skills to the public, from invading aircraft code to monitoring surveillance cameras, and then to using any USB device as attacking tool.

Even though some of the security issues are sensational in theory, but they are pioneers that uncover security risks in Internet world.

1. Quietly deadly BadUSB

A researcher in Berlin “Security Research Laboratory” claimed that they had developed conceptual tools to attack USB device firmware. When the infected USB device is plugged into the computer, it will disguise as keyboard to download malicious software.

Since most USB device manufacturers haven’t taken any measures to protect the firmware, and anti-malicious software won’t scan firmware malicious behaviors. So theoretically this vulnerability can spread malicious software owing to hard to find and difficult to prevent, and imagine how many USB devices are interacting with computers over the world, we know how terrible this vulnerability is. Fortunately, in reality we have not found attacks based on this vulnerability.

2. Invade aircraft

The consequence of another conceptual attack is more terrible. A researcher in the field of human-computer interaction, Ruben Santamarta claimed that hackers can invade aircraft satellite communication system via Wi-Fi and entertainment systems, thereby allowing the attacker to affect aircraft navigation and safety systems.

The satellite communication system manufacturer said in an interview with Reuters, the possibility of such attack and harm caused by the attack are very small, but they also said they had begun to fix loopholes.

3. Being monitored surveillance cameras

Are your surveillance cameras monitored by other people?

Two security researchers opened a $ 200 Dropcam camera, wanting to see how it works internally. It turned out that there are many vulnerabilities that hackers can make use of them to not only browse the video camera in the store but also upload to third-party video and forge to be taken by other machine. In short, hackers can hijack and take over the camera’s video stream.

Fortunately, there’s a significant adverse condition to implement this terrible security vulnerability: an attacker need physically access to your Dropcam camera. In other words, if an attacker can strut into your room and access to your camera, the security issue on your company or your room is more serious than that of surveillance camera.

4. Tor crisis

Tor provides anonymous access between the source node to the destination node for the user. However, a researcher Alexander Volynkin at Carnegie Mellon University said that with minimal cost to break the anonymity of Tor network is very possible. However, the specific implementation details hadn’t been announced yet.

However, urged on by Carnegie Mellon University, Volynkin abruptly canceled his speech at the hackers conference. Meanwhile, recently Tor’s operators also discovered a set of unidentified malicious relay node, Tor tries to decrypt the user’s identity. (Reference: peeled onion skin, deep Inside the Tor network)

5. Symantec Endpoint Protection loophole

Renowned security expert Mati Aharoni discovered three vulnerabilities in Symantec Endpoint Protection tool. These vulnerabilities could allow an attacker to launch high-level access to the victim’s computer. In other words, hackers can invade your computer through security software. Would not it be a very ironic thing?

Of course, Symantec has started repairing the vulnerabilities!

The last five vulnerabilities will be revealed in next blog post, please stay tuned!

If you want to know information about personal or enterprise file protection solutions, please visit: http://www.kakasoft.com.