And You Thought Your Electronic Devices Were Safe From Hackers?

hacker masked

The Amphion Forum 2012 was the place to be if you wanted to understand the real security risks in having electronic devices such as cell phones, computers, and even printers. When Ang Cui, a fifth year student at Columbia University’s Intrusion Detection Systems Lab demonstrated how easy it was for him to hack into the networked devices from a remote location, the audience was struck with awe and for a moment there was a great silence in the room. Networked devices such as VoIP phones are becoming commonplace with the advent of cheap international calling using VoIP based call termination.

Cui said that their lab is very popular with the media but their interest in this project are much different than what the media is expecting. The lab wants to exploit every vulnerability they can find so they can come up with a solution on how to protect against them. The media is more interested in the one time finding because they want to create hype over the find. If you visit the lab’s page you will see this disclaimer: “Any portrayal by the media that this printer poses a risk of fire should not be interpreted as a conclusion derived from our study.”

Cui used a Cisco branded VoIP phone and removed a little external printed circuit board (PCB) to hack into it. You might think that it would be very hard for an intruder to remove these circuits from devices. However, it is as easy as waiting for a printer to become unattended or a phone left sitting around without anyone around. In a blink of an eye the intruder can remove the circuit even if the phone is locked because the circuit is an external one. Cui then demonstrated that he could record the conversation from the phone word for word. He did not give specifics of the vulnerability but said that once you have control over the phone, you are able to get into the phones that are attached to the network.

The project that lead to this vulnerability was named “Project Gunman V2”, which has lead to the disclaimer mentioned above. In this project they inject malicious code to compromise the functionality of a printer. Once the code is injected into a networked printer, it can be exploited to control the network. It sounds like a plot from a science fiction movie, but this is indeed becoming a reality.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:

Other articlesgo to homepage

7 Purchasing the best hand-made WOW GOLD at IGXE.com

7 Purchasing the best hand-made WOW GOLD at IGXE.com(0)

Accumulating WOW GOLD is not as simple as most of the players consider. The selling of items that the player loot from the monsters is not always possible even if the player spends the months after the months. There is a faster way to find sufficient gold. It is to purchase WOW GOLD from the

Stop Dragging Your Feet: Three Reasons Why Your Amazon Customers Are Impatient About Their Orders

Stop Dragging Your Feet: Three Reasons Why Your Amazon Customers Are Impatient About Their Orders(0)

Running an Amazon store need not be a drag. But it can quickly become one if you don’t have the necessary tools and resources to get your orders managed and fulfilled in a timely and cost effective manner. The truth is that the fulfillment process, and keeping customers updated, can leave many Amazon store operators

Finding an Event Registration Tool That Matches Your Requirements

Finding an Event Registration Tool That Matches Your Requirements(0)

The internet has pretty much changed the way in which we do everything, and registering for an event is no different. If you or your business regularly host events, there is now an expectation that you make it possible for people to register online. The days of RSVP’ing to a formal invitation or e-mail are

Gaming Industry Thriving On Digital Trials

Gaming Industry Thriving On Digital Trials(0)

Video games are increasingly prevalent in all corners of technology, thanks in large part to the explosive popularity of mobile gaming. And just like other aspects of technology, the gaming industry is constantly evolving to cater to the needs and desires of consumers. One of the most interesting things about how the gaming industry has

Why Returns Management Software Can Be the Saving Grace of the Ecommerce Industry

Why Returns Management Software Can Be the Saving Grace of the Ecommerce Industry(0)

Product returns are unavoidable. According to a dated Time Magazine report, they exceeded $2 billion in 2012, a 10 percent increase from the year prior. Today, continuing this trend, returns are estimated to be in the $220 billion dollar marker, with a vast majority of returns being initiated just after Black Friday (the popular U.S.

read more

Contacts and information

Social networks

Most popular categories

© 2012 computimesinc.com All rights reserved.