Olympia London
Hammersmith Rd, London, United Kingdom
Ken Munro will be presenting twice at the IoT Security Theatre: 12:00 - 12:40: Connected Crime and the IoT 15:30 - 16:10: Live Hacking and Penetration Testing Register here: https://iotbuild-emea.internetofbusiness.com/pricing
De Vere Tortworth Court
Tortworth, Wooten-Under-Edge, Gloucestershire, United Kingdom
Tony Gee will be presenting: Hacking the IoT and blockchains This talk will focus on breaking the security principles of the Internet if Things, showing practical demonstrations and how these techniques can be applied to hacking blockchain technology and hardware wallets.
Albert Borschette Congress Center (CCAB)
Rue Froissart 36, European Parliament, Rue Wiertz 60, Brussels, Belgium
As part of the EC's International Product Safety Week 2018, Mark Harrison will be presenting: Kettles and kids toys, how safe is the IoT in our house? – Live Hack Details here: https://ec.europa.eu/info/events/international-product-safety-week-2018-2018-nov-12-0_en
Sheraton Pentagon City Hotel
900 S Orme St, Arlington, VA, United States
Ken Munro will be presenting a Live Satellite Hack In this innovative presentation, Munro plans to carry out some live hacking demonstrations against satellite terminal equipment, showing how poor security practice can expose the users systems to compromise. Munro will also look briefly at the security of satellites themselves. With very similar security issues found […]
Grand Connaught Rooms
61-65 Great Queen St., London, United Kingdom
Mark Harrison will be presenting: IoT – Let’s Hack Stuff! The IoT is here to stay, with all its flaws, failings and frustrations. Even devices as innocuous as connected toys can be hacked and used for ‘evil’ purposes. Mark Harrison revisits the infamous hack of the My Friend Cayla doll, as well as sharing some […]
Olympia London
Hammersmith Rd, London, United Kingdom
Both Nigel Hearne and Tony Gee will be speaking. Photo: @LisaForteUK Nigel Hearne: How to hack the sea lanes Theatre 7 - 12:20 – 12:40 • How to locate potentially vulnerable vessels and on-board technology • How could a malicious threat actor potentially attack a ship at sea? • But his maritime security stuff’s all […]