Mobile Encryption And Security At Black Hat Conference

Hacking Mobile Platforms Hot Topic at Black Hat Conference
Director of NSA Delivers Keynote Amidst Breaking XKEYSCORE News

Every year in the ballrooms at Caesar’s Palace hotel in Las Vegas, approximately 7,500 of the world’s leading security experts gather to discuss information security and expose vulnerabilities at the Black Hat Conference.

As a provider of hardware-based, military-grade mobile encryption security solutions, KoolSpan attends to ensure it keeps abreast on industry developments and emerging risks and vulnerabilities in the marketplace. Mobile Security has recently been a key topic at Black Hat with the rise of Google Android and Apple IOS smartphones. It was top of mind to those in attendance this year in the wake of the NSA leaks and Americans’ new hyper-vigilance about mobile threats.

This year’s program explored threats to mobile devices such as how to hack an iPhone in 60-seconds using malicious chargers, intercepting traffic and SMS messages through compromised femtocells, cracking BlackBerry’s new OS 10, rooting SIM cards, and building a spy phone that can record conversations and send messages without you ever knowing. Even newly briefed attacks against SSL, the heart of secure web traffic, threaten mobile platforms and their reliance on web-based applications.

The keynote for Black Hat 2013 was delivered by Gen. Keith Alexander, Director of the NSA and Commander, U.S. Cyber Command (USCYBERCOM). Gen. Alexander’s brief came as the Guardian UK timed news releases about “XKEYSCORE,” the NSA tool that collects everything a user does on the Internet. The NSA’s PRISM and XKEYSCORE surveillance programs have shown just how fragile Internet security is for users around the world.

There was mixed reaction during his packed speech where he assured attendees that the NSA’s surveillance programs properly protected U.S. citizens’ rights through policy and technology. Check out the full gallery of the General’s keynote and slides courtesy of ZDNET and judge for yourself.

Verified by MonsterInsights