Our customized threat modeling identifies vulnerabilities within your security posture that puts your most valuable organizational and client data — the crown jewels — at risk.
Our security audits and vulnerability assessments are based on industry standards and best practices to assess weaknesses in your cloud environment and network, as well as mobile and web-based apps.
Our sophisticated testing services delve into your network, smart devices and other systems to expose critical security deficiencies.
Joe Hopper, a Principal Security Consultant at Fracture Labs, shares his expertise in IoT security at the
2021 DriveWorld & Embedded Systems Conference in San Jose on August 18, 2021. In his two sessions, he will be demonstrating live hacks against off the shelf IoT devices and will walk through how hackers approach embedded systems.
Have your embedded systems been built with appropriate security controls in mind? Joe Hopper, Principal Security Consultant at Fracture Labs, will demonstrate several complex hacks against off-the-shelf IoT devices to shed light on the design and implementation weaknesses seen across the industry. He will walk through common attacks such as: finding and connecting to hidden serial consoles, boot process hijacking, memory analysis, firmware extraction, password cracking, and more to gain unauthorized access to IoT devices and customer information.
By using the same approach hackers use against your devices, you will walk away with a better understanding of where and how you need to tighten security controls.
Hackers don’t see “just a smart light” or “only a telematics sensor.” They see a computer that allows them to steal intellectual property, grab sensitive data, cause physical damage and injuries, or pivot into a victim’s network!
As a professional hacker, Joe Hopper of Fracture Labs will take you through the mindset of a hacker. You’ll learn what motivates hackers, how they approach an attack against your IoT systems, and what stops them. By the end, you will understand common attacks against hardware, software, and communication signals so you can incorporate tighter security controls in your products.
The team at Fracture Labs has hacked a myriad of systems, including defense vehicles, aircraft, municipal smart lighting, medical devices, and many others! Let their experience with embedded system security give you a head start on securing your devices from chip to cloud!
reach out if you’d like more information regarding our
smart device security assessments!
Please share this post if you found it useful and reach out if you have any feedback or questions!
You might not know how at-risk your security posture is until somebody breaks in . . . and the consequences of a break in could be big. Don't let small fractures in your security protocols lead to a breach. We'll act like a hacker and confirm where you're most vulnerable. As your adversarial allies, we'll work with you to proactively protect your assets. Schedule a consultation with our Principal Security Consultant to discuss your project goals today.
© 2021 FRACTURE LABS, LLC ALL RIGHTS RESERVED