There’s much of the electromagnetic spectrum that we cannot see. Like how LED wristbands are triggered at concerts or how to identify someone at DEF CON in a crowd of cellphones and electrical devices. Eric…
Category: Episode
How might we mitigate the risk to millions of unauthenticated devices already out in the field? Ron Fabela, Field CTO at XONA Systems, has some ideas about how to achieve zero trust in either legacy…
In a talk at , Sharon Brizinov and Noam Moshe from , disclosed a significant vulnerability in the Open Platform Communications Universal Architecture or OPC-UA, a univsersal protocol used to synchronize different OT devices. In…
What would happen if someone stole the encryption keys for a major satellite? Well, it’d be game over. Unless the satellite used quantum cryptography. Skip Sanzeri from QuSecure explains how using “quantum tunnels” will allow…
This is a story of what’s needed for the Capture The Flag competition at DEF CON 31 to be hosted for the first time on a live satellite orbiting 400 kilometers above the Earth. Mike…
Moonlighter is the world’s first and only hacking sandbox in space. Currently orbiting the earth near the International Space Station, the satellite is the playground for this year’s Hack-A-Sat competition at DEF CON 31. Mike…
Could a personal medical device be a threat for an organization? Turns out it’s similar to protecting against an attack on a mobile device.Except a denial of service could prove fatal. Todd Brasel, the author…
Josh Corman, VP of Cyber Safety Strategy at Claroty, is a hacker who knows public policy well. Ten years ago he created the volunteer organization I Am The Cavalry to help educate sitting legislators on…
This is the story about researchers who monitor the threats against Iot and OT systems, and the steps being taken to mitigate them. Ishmael Valenzuela, Vice President of the threat research and Intelligence Team at…