How Vulnerable Are Our Homes? - The Story of How My Home Got Hacked

  • Wednesday, April 22, 2015 | 10:20 AM – 11:10 AM | West | Room: 3018

View all Sessions

What does it take to hack into someone's home? What are the attack vectors? Entry points? These are questions I wanted to answer. We often do everything we can to protect our endpoints from threats, but are there other ways to attack someone? I decided to find out and within 20 minutes I was able to turn my devices into nodes in botnets to perform advanced attacks.


This document was retrieved from on Sun, 18 Aug 2019 20:00:10 -0400.