Posted on
in Presentations
Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.
Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.
Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community