WHO WATCHES THE PRE-INSTALLED APPS?
1RERG\OLNHVEORDWZDUHEXWZKRPDNHVVXUHWKDWSUHLQVWDOOHGDSSVDUHQ¶W
wolves wrapped in wooly disguises? The answer is Google. Senior Security
Engineer Maddie Stone described the challenges of identifying malicious apps
DPRQJSUHLQVWDOOHGDSSV2QHSUREOHPSUHLQVWDOOHGDSSVKDYHKLJKHUSULYLOHJHV
DQGZHLUGEHKDYLRUVE\YLUWXHRIEHLQJSUHLQVWDOOHGZKLFKPDNHV¿QGLQJWKH
dangerous ones extra hard.
GET THE PENTHOUSE WITH A HACKED BLUETOOTH KEY
Bluetooth-enabled locks you open with an app have got to be more secure
than boring metal pins and tumblers, right? Not at Black Hat. With a little
know-how and some low-cost hardware, two researchers were able to open
doors and extract all kinds of useful information. Maybe we should just stick
with skeleton keys.
EVEN CHINESE HACKERS NEED SIDE GIGS
/HW¶VVD\\RX¶UHDKDFNHUDQG\RX¶UHPDNLQJSUHWW\JRRGPRQH\ZRUNLQJIRU
\RXUORFDOJRYHUQPHQW:KDW¶VWRVWRS\RXIURPPRRQOLJKWLQJDQGHDUQLQJD
OLWWOHH[WUDPRQH\E\VD\LQ¿OWUDWLQJWKHVXSSO\FKDLQIRUYLGHRJDPH
GHYHORSHUV"$SSDUHQWO\QRWKLQJLI)LUH(\H¶VUHVHDUFKLVWREHEHOLHYHG
&RQVLGHULQJWKDWWKHKDFNHUVLQTXHVWLRQZRUNIRUWKH&KLQHVHJRYHUQPHQWLW¶V
a bit surprising to see the group enriching themselves on the side. This might be
WKH¿UVWVHFXULW\UHVHDUFKZKRJRWDKDFNHULQWURXEOHZLWKWKHLUERVV
PC MAGAZINE DIGITAL EDITION I SUBSCRIBE (^) I SEPTEMBER 2019