Every year, we always see all kinds of exhibitions and conferences, such as consumer electronics, game exhibitions, wedding fairs, home fairs, etc., but there is also a hidden conference, and you may rarely hear about it in the mainstream media.

  

  The content of the conference is closely related to our business and life. It is always covered with a mysterious veil, so that you can never see it really, for example, the Black Hat Conference.

  This black hat conference gathered a group of mysterious people-hackers! The content of the conference is various technical discussions, such as creating terrible loopholes, cracking ATM machines, and attacking patients who use pacemakers through technology.

  Isn’t it a bit exciting … Now I will unveil the mystery of the black hat for you.

  Founded in 1997, Black Hat is held in Las Vegas from late July to early August every year. It is recognized as the highest event in the world information security industry and the most technical information security conference.

  Although the official slogan revolves around security, it is actually a veritable hacker event.

  It’s a "summer camp" where hackers rarely get together actively. Of course, there are also some large companies’ security departments that send delegations. Domestic companies such as Alibaba, Tencent and 360 will send their security technology departments to communicate.

  So, what does Black Hat have to do with us? This should start with the atmosphere of Black Hat, which is different from those conventions we know, and the atmosphere of Black Hat is quite loose.

  Participants will not care about your status and identity, but will share the loopholes discovered in the past year and the various "black technologies" invented, and then improve their knowledge and improve industry safety.

  Of course, this free atmosphere also has a negative side. For example, in Black Hat in 2002, David Litchfield, one of the founders of NGS software company, mentioned the vulnerabilities of Microsoft and Oracle Bone Inscriptions products in his speech that year.

  So the hacker used the vulnerability he published to retrieve the code and developed the famous SQL Slammer worm.

  As soon as the virus appeared, it infected 75,000 computers within 10 minutes, which greatly slowed down the speed of the global Internet and brought economic losses to many countries and regions.

  Although Microsoft had released an update to block the vulnerability at that time, many people failed to update it in time, which led to the move. Now, finding the vulnerability has become a reserved program of Black Hat.

  Both hackers and technology companies are always concerned, for fear that loopholes will be discovered and cause serious economic losses.

  In addition to the discovery and sharing of vulnerabilities, hackers’ fighting skills in Black Hat are also very exciting. For example, in 2010, Barnaby Jack, director of security testing at IOActive in Seattle, demonstrated how to crack ATM machines.

  The demonstration of letting the ATM automatically spit out a pile of banknotes, he took advantage of the system loophole in the ATM, which made the ATM spit out one genuine dollar after another without inserting a card.

  For the sake of security, Barnaby Jack finally said that he would not release public programs to crack ATM, which earned him the respect and appreciation of many hackers.

  In addition, Barnaby Jack also planned to announce a technology to attack pacemakers in 2013, which can make patients who use pacemakers release voltage, thus causing people to die.

  But he was found dead in his apartment in San Francisco on the eve of the conference, so this appalling thing was not shown to the world.

  Of course, in addition to top "hackers" like Barnaby Jack, many people showed how to break through iOS and Android systems at the meeting. The way they competed was how to crack the mobile phone in the fastest time.

  Therefore, the annual Black Hat period is also the best time for Apple and Google to collect vulnerabilities. It is worth mentioning that Alibaba is also a frequent visitor to Black Hat, and the technology displayed is also very eye-catching.

  For example, at last year’s Black Hat, researchers from Alibaba’s security department showed how to attack smart devices with sound. They showed a rectangular box.

  This box can send out ultrasonic waves. When it is close to electronic equipment, it can stop working and be paralyzed, including DJI UAV, iPhone, Xiaomi balance car and other well-known intelligent hardware products.

  Such cool technology is really like in the movie. Of course, in the end, researchers from Ali will improve the scheme and provide it to the attacked companies for free.

  Although Black Hat brings us a lot of positive energy every year, just like the worm virus incident mentioned earlier, every session of Black Hat has less peaceful hackers, which brings a discordant episode, such as this year’s Black Hat.

  A hacker got all the information of 180,000 participants through technical means, including e-mail, address, telephone number, company name, etc., which brought a lot of trouble to the participants.

  But in the end, I want to say that although the world of hackers is strange and mysterious to us, they can always strike a fatal blow to those companies that claim to be safe and reliable through some superb means.

  However, through Black Hat, we also found that there are actually many "kind" hackers in the world. Through sharing and communication with Black Hat, for example, our Internet world has become reliable and complete.

  It is enough to play with Smart Tide Technology and pay attention to Wisdom Black.

  We have [good things/fun/dry goods/evaluation], and we want to collect the most interesting technology in the world for you to see ~


Posted

in

by

Tags: