Flaws within the chips in our laptops, in our homes, and in our critical infrastructure could become the access one needs to steal data if not just shut down an assembly line, or hold up…
Error Code Posts
Can your OT function if the IT system goes down? OT self-sufficiency is critical for infrastructure such as rail systems. Chris Warner, from GuidePoint Security, discusses how this infrastructure continuity is important not only for…
Quantum computers will change and even break the cryptography we have today. To defeat a “Harvest Now, Decrypt Later” strategy by bad actors (even nation states), Denis Mandich, CTO and co-founder of Qrypt, is proposing…
When we think of massive compute power, we think of the Cloud when we really should consider the millions of unprotected OT devices with even greater slack computer power that our current cloud services combined.…
There’s much of the electromagnetic spectrum that we cannot see. Like how LED wristbands are triggered at concerts or how to identify someone at DEF CON in a crowd of cellphones and electrical devices. Eric…
How might we mitigate the risk to millions of unauthenticated devices already out in the field? Ron Fabela, Field CTO at XONA Systems, has some ideas about how to achieve zero trust in either legacy…
In a talk at , Sharon Brizinov and Noam Moshe from , disclosed a significant vulnerability in the Open Platform Communications Universal Architecture or OPC-UA, a univsersal protocol used to synchronize different OT devices. In…
What would happen if someone stole the encryption keys for a major satellite? Well, it’d be game over. Unless the satellite used quantum cryptography. Skip Sanzeri from QuSecure explains how using “quantum tunnels” will allow…
This is a story of what’s needed for the Capture The Flag competition at DEF CON 31 to be hosted for the first time on a live satellite orbiting 400 kilometers above the Earth. Mike…