Search Immortality Topics:



The IT Pro Podcast: Meet the cyborg hacker – IT PRO

Posted: September 24, 2022 at 2:06 am

The technological arsenal available to cyber criminals is already enough to give any security professional nightmares, but theres another emerging threat on the horizon that may keep them up at night: bio-augmented hackers. Implantable chips and other modifications are growing in capability and sophistication, and there are a variety of creative ways that attackers can use them to carry out both physical and device-based attacks -

This is made all the more concerning by the fact that these implants are all but impossible to detect. This week, were joined by CyberArk technical evangelist, white hat hacker and self-described transhumanist Len Noe to find out what kind of augmentations cyber criminals currently have access to, how can they be used in intrusions, and why the industry needs to start preparing for their implementation now - as well as some of the positive uses that this technology can be put to.

Would you like me to tell you how I get through an airport? I put the left foot in front of the right and then I repeat. That's it There is not enough combined metal in all of my implants to actually trigger a magnetometer even if I'm doing the X-ray metal detector, [it] doesn't show up, I can walk straight through, the magnetometer will not trigger.

I know that I'm using it. I know of quite a few people who are on red teams that are using this technology. We have not found any indications from any type of incidents that have actually happened in the wild where implants were shown to be the root cause, but at the same time, how would you be able to determine that - and therein lies the problem.

From an actual implementation perspective, there is currently no way to actually detect an augmented human with this type of technology inside the body. And that becomes a very large problem for security professionals. And the only way that I can really give as a way to try and combat this is a true defence in depth, and a layered security approach.

Read the full transcript here.

Mastering retention

Turning user behaviour insights into retention strategies

Dell PowerEdge with AMD

IT applications and infrastructure are the prime catalyst for new revenue creation

Building for success with off-premises private cloud

Leveraging co-location facilities to execute your cloud strategy

Cyber resiliency and end-user performance

Reduce risk and deliver greater business success with cyber-resilience capabilities

Original post:
The IT Pro Podcast: Meet the cyborg hacker - IT PRO

Recommendation and review posted by G. Smith