Tag: security

Securing a WordPress Server Being Used as a PingBot Attack Node

wp-targetSo I come in to work this morning and notice that one of my WordPress sites is having problems reliably coming up.  I had not received any alerts on my phone, but still, around 1/2 the time the main news-feed page wasn’t coming up. If you ever see a system that’s normally rock solid, suddenly running “a little funny”.. don’t put it off.  Jump on and do a bit of poking around. I did that today and this post is documenting what I found, what I learned and what I had to do to secure my system. Continue reading

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Public Talk: Security for ‘Internet of Things’: Physical Attacks and Countermeasures

Abstract:
mobilelockchain+cutters

As our culture begins buying more and more Internet enabled devices for our person, in our cars, homes and office systems; we are  wading deeper and deeper into the vulnerable, untested waters of “Internet of Things” (IoT) security.  We are now seeing in the news that the safety of our embedded devices are at higher and higher risk of being “hacked”, and little is being with regards to IoT device security until after such systems are hacked and in the news.In this talk, we will cover several types of Physical Attacks that IoT hardware designers and users should all know about.

nest-p0wn3dIn this talk, we will cover several types of Physical Attacks that IoT hardware designers should know about. Physical attacks are a type of cryptanalysis, or the analysis of information systems in order to discover the hidden aspects of devices and systems using their implementation properties. Fault Injection is the force used to change the physical behavior of the running device to discover additional security information or ways into the system. Physical attack
and fault injection research is critical because it is a preferred low cost attack method used by both black hats to discover new IoT/hardware/software attack vectors, as well as by white hats to help discover and address these vulnerabilities early in the design cycle before the get to market.
The more physical attack research that is done on IoT devices, the safer we all will be.

Speaker Bio:
Nahid-photo
Nahid Farhady Ghalaty is a fourth year PhD. candidate at the Bradley department of Electrical and Computer Engineering, Virginia Tech. Her research is mainly focused on physical cryptanalysis, secure embedded systems, new directions in hardware security, specifically fault attacks and side channel attacks and countermeasures. She received her BS degree in software engineering from Shahid Chamran University of Ahvaz, and her MS degree in computer architecture from Sharif University of Technology. Her MS research was on reliability and fault tolerant embedded system designs. She has been the recepient of the best paper in session award at SRC TECHcon 2015. She has been also the recipient of the best poster and presentation award in the Center for Embedded Systems for Critical Applications (CESCA) at 2014 and 2015. She is the author of several papers in international conferences including DATE, FDTC, HOST, COSADE, etc. She has also served as a reviewer to several conferences and journals including FDTC, DAC, CHES and DATE.

 

 

 

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

© 2017 Racksburg

Theme by Anders NorenUp ↑