Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Top Cybersecurity Threats Unveiled by Hackers – Is Anyone Safe?

Author: Scarinci Hollenbeck, LLC

Date: August 25, 2015

Key Contacts

Back

The world’s top security experts, hackers, and researchers gathered recently in Las Vegas for the Black Hat and DEF CON conferences to discuss the top cybersecurity threats on the globe.

The events confirmed that no industry is safe from the top cybersecurity threats, with hackers exposing vulnerabilities in everything from cell phones to drones to rifles.

The ability to remotely control a Jeep Grand Cherokee via its UConnect entertainment system was arguably the most publicized hack to come out of the Black Hat conference. The security vulnerability subsequently prompted the recall of approximately 1.4 million Chrysler-Fiat vehicles in the United States.

Although they did not receive the same media attention, presenters at Black Hat and DEF CON revealed several other equally concerning cybersecurity threats. Below are just a few:

  • Intel CPUs: Older Intel chips that predate second-generation Core processor family (known as Sandy Bridge) have a security flaw that allows hackers to install a rootkit into the System Management Mode (SMM). The vulnerability is significant because antivirus is unable to detect the malware and hackers can still access the machines even after a complete wipe.
  • Android Devices: Security experts revealed a security flaw that impacts millions of Android devices. According to security experts, attackers could gain access to the devices via a simple MMS message or multimedia file. To address the issue, Android will embark on the “single largest unified software update in the world.”
  • Smart Safes: Retailers and other businesses often rely on high-tech safes that have built-in computers. In many cases, the touch screen interface requires two users to provide authentication credentials in order to safe. Hackers showed how they could access the computer to create new users and then use a USB thumb drive port to enter their phony credentials.
  • OnStar Vehicle Technology: Chrysler is not the only automaker with cybersecurity concerns. Hackers revealed that they were able to “locate, unlock and remote start any vehicle with OnStar RemoteLink after intercepting communication between the RemoteLink mobile app and OnStar servers.”
  • Internal LTE/3G Modems: Laptops and tablets increasingly come equipped with internal modems that allow users to work remotely via a mobile data connection. Hackers used a flaw in the firmware update process to install malware that persists even if the operating system is wiped or reinstalled.

For businesses hoping to avoid the embarrassment of being the subject of a future Black Hat or DEF CON hacking presentation, the conference highlighted the importance of addressing cybersecurity at the outset of product development and testing. In some cases, identifying potential vulnerabilities may require putting a hacker on payroll.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Are Stay Interviews the Key to Retaining Top Talent? post image

Are Stay Interviews the Key to Retaining Top Talent?

Retaining top talent continues to be one of the greatest challenges facing employers today. Even in an employer’s market, the loss of a key employee can disrupt operations and result in significant costs. While compensation plays a role, long-term retention often depends on workplace culture, communication, and employee engagement. One increasingly popular strategy for improving […]

Author: Angela A. Turiano

Link to post with title - "Are Stay Interviews the Key to Retaining Top Talent?"
Why Secured Transactions Are Important post image

Why Secured Transactions Are Important

Secured transactions form the backbone of a wide range of business dealings, including business loans, mortgages, and inventory financing. Because the stakes are often high and relatively minor oversights can have drastic consequences, lenders and borrowers should thoroughly understand how to form an enforceable security agreement that protects their legal rights. What Is a Secured […]

Author: Dan Brecher

Link to post with title - "Why Secured Transactions Are Important"
Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications post image

Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications

Cashing a check marked “paid in full” can be a risky endeavor, particularly if you don’t fully understanding the legal implications. If you are owed more than the amount of the check you accept and deposit, you may waive your right to collect the full disputed amount. That is why you should consider either rejecting […]

Author: Dan Brecher

Link to post with title - "Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications"
Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors post image

Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors

The One Big Beautiful Bill Act of 2025 (OBBBA) significantly impacts federal taxes, credits, and deductions. A key change relating to Qualified Small Business Stock (QSBS) allows greater tax-free gains for investments in startups and other qualifying small businesses. Company founders and other investors should understand how the enhanced tax strategy works or risk missing […]

Author: Dan Brecher

Link to post with title - "Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors"
Corporate Consolidation and Antitrust Issues in Mergers post image

Corporate Consolidation and Antitrust Issues in Mergers

Corporate consolidation involves two or more businesses merging to become a single larger entity. The result is often a stronger and more competitive company that can better navigate today’s competitive marketplace. What Is Corporate Consolidation? Corporate consolidation closely resembles a basic merger transaction. The primary difference is that a consolidation creates an entirely new business […]

Author: Dan Brecher

Link to post with title - "Corporate Consolidation and Antitrust Issues in Mergers"
What is Business Law and Why Is it Important? post image

What is Business Law and Why Is it Important?

Business law plays a critical role in nearly every aspect of running a successful enterprise, from negotiating a commercial lease to drafting employee policies to fulfilling corporate disclosure obligations. Understanding what is business law and your legal obligations can help your business run smoothly and build productive relationships with clients, business partners, regulators, and others. […]

Author: Dan Brecher

Link to post with title - "What is Business Law and Why Is it Important?"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!