Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Hacking and attacking automated homes

Ms Smith (via Networkworld) | June 26, 2013
Do you have an automated home system, a 'smart' house? At Black Hat USA 2013 and Def Con 21, there will be several presentations about attacking the automated house, including automated homes using the Z-Wave wireless protocol.

36 million home & office security systems reside in the U.S., and they are all vulnerable. This is not your grandpa's talk on physical security; this talk is about bypassing home and office digital physical security systems, from simple door sensors to intercepting signals and even the keypad before it can alert the authorities. All the methods presented are for covert entry and leave no physical sign of entry or compromise. If you are interested in bettering your skills as a pen tester or just want to know how break into an office like a Hollywood spy this is the talk for you. Come join us to see live demos of what the security companies never want you to see.

Smart homes are both exciting and terrifying, and will increasingly be so after the hacking and attacking automated home talks. Until we know more about how to protect ourselves from "home automation hacker bots," CEPro advised not to use the default username and password, not to leave ports open or use port forwarding, and to use "VPN systems whenever possible, because data in-between is encrypted and there are no open ports for hackers to exploit."

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.