The technological arsenal available to cyber criminals is already enough to give any security professional nightmares, but theres another emerging threat on the horizon that may keep them up at night: bio-augmented hackers. Implantable chips and other modifications are growing in capability and sophistication, and there are a variety of creative ways that attackers can use them to carry out both physical and device-based attacks -
This is made all the more concerning by the fact that these implants are all but impossible to detect. This week, were joined by CyberArk technical evangelist, white hat hacker and self-described transhumanist Len Noe to find out what kind of augmentations cyber criminals currently have access to, how can they be used in intrusions, and why the industry needs to start preparing for their implementation now - as well as some of the positive uses that this technology can be put to.
Would you like me to tell you how I get through an airport? I put the left foot in front of the right and then I repeat. That's it There is not enough combined metal in all of my implants to actually trigger a magnetometer even if I'm doing the X-ray metal detector, [it] doesn't show up, I can walk straight through, the magnetometer will not trigger.
I know that I'm using it. I know of quite a few people who are on red teams that are using this technology. We have not found any indications from any type of incidents that have actually happened in the wild where implants were shown to be the root cause, but at the same time, how would you be able to determine that - and therein lies the problem.
From an actual implementation perspective, there is currently no way to actually detect an augmented human with this type of technology inside the body. And that becomes a very large problem for security professionals. And the only way that I can really give as a way to try and combat this is a true defence in depth, and a layered security approach.
Read the full transcript here.
Mastering retention
Turning user behaviour insights into retention strategies
Dell PowerEdge with AMD
IT applications and infrastructure are the prime catalyst for new revenue creation
Building for success with off-premises private cloud
Leveraging co-location facilities to execute your cloud strategy
Cyber resiliency and end-user performance
Reduce risk and deliver greater business success with cyber-resilience capabilities
Original post:
The IT Pro Podcast: Meet the cyborg hacker - IT PRO
Recommendation and review posted by G. Smith