Hacking the Airwaves
Hacking the Airwaves
• This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar
• Please submit questions via the button on the upper left of the viewer• If we don’t get to your question during the webinar, we will
follow up with you via email• Download related resources via the “Attachments” button above
the viewing panel• On ? Join the conversation: #pineapples @HOSTINGdotcom
2
Housekeeping
3
Our speaker today:
Johan Hybinette, CISO, HOSTING
Pineapples?
4
5
6
7
8
9
10
Kali PI(es)
11
Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015
Id IOT Hacking
12
ZigBee Stardust
During an 18 minute flight, the drone found nearly 1,600 Internet-connected devicesRef: http://thehackernews.com/2015/08/hacking-internet-of-things-drone.html
Id IOT Hacking
13
RollJam
14
RollJam
15
SDRs
16
SDRs
17
RFID Hacking
• Same passwords used everywhere• Banking Access• Zombies• Phishing• Identity Theft• Mules• Online Accounts
18
Why Care?
• Set your devices to not automatically connect to Wi-Fi• Only connect to trusted sources• PermaVPNs• Connection alerts
19
Protect Yourself over Wi-Fi
• Watch your social media accounts• Think! DO NOT share• Encrypt All Data• Never overshare on social networking sites• Be wise about anything wireless• Password Wallets• Use Certificates
20
Protect Yourself Online
• Check Your Credit Regularly• Protect your assets• Always Ask• Patch• Encrypt • Use Secure EMail
21
Protect Your Equipment
22
Q&AFor more information about technical security by HOSTING, please
contact our team at 888.894.4678.