Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Top Cybersecurity Threats Unveiled by Hackers – Is Anyone Safe?

Author: Scarinci Hollenbeck, LLC

Date: August 25, 2015

Key Contacts

Back

The world’s top security experts, hackers, and researchers gathered recently in Las Vegas for the Black Hat and DEF CON conferences to discuss the top cybersecurity threats on the globe.

The events confirmed that no industry is safe from the top cybersecurity threats, with hackers exposing vulnerabilities in everything from cell phones to drones to rifles.

The ability to remotely control a Jeep Grand Cherokee via its UConnect entertainment system was arguably the most publicized hack to come out of the Black Hat conference. The security vulnerability subsequently prompted the recall of approximately 1.4 million Chrysler-Fiat vehicles in the United States.

Although they did not receive the same media attention, presenters at Black Hat and DEF CON revealed several other equally concerning cybersecurity threats. Below are just a few:

  • Intel CPUs: Older Intel chips that predate second-generation Core processor family (known as Sandy Bridge) have a security flaw that allows hackers to install a rootkit into the System Management Mode (SMM). The vulnerability is significant because antivirus is unable to detect the malware and hackers can still access the machines even after a complete wipe.
  • Android Devices: Security experts revealed a security flaw that impacts millions of Android devices. According to security experts, attackers could gain access to the devices via a simple MMS message or multimedia file. To address the issue, Android will embark on the “single largest unified software update in the world.”
  • Smart Safes: Retailers and other businesses often rely on high-tech safes that have built-in computers. In many cases, the touch screen interface requires two users to provide authentication credentials in order to safe. Hackers showed how they could access the computer to create new users and then use a USB thumb drive port to enter their phony credentials.
  • OnStar Vehicle Technology: Chrysler is not the only automaker with cybersecurity concerns. Hackers revealed that they were able to “locate, unlock and remote start any vehicle with OnStar RemoteLink after intercepting communication between the RemoteLink mobile app and OnStar servers.”
  • Internal LTE/3G Modems: Laptops and tablets increasingly come equipped with internal modems that allow users to work remotely via a mobile data connection. Hackers used a flaw in the firmware update process to install malware that persists even if the operating system is wiped or reinstalled.

For businesses hoping to avoid the embarrassment of being the subject of a future Black Hat or DEF CON hacking presentation, the conference highlighted the importance of addressing cybersecurity at the outset of product development and testing. In some cases, identifying potential vulnerabilities may require putting a hacker on payroll.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Crypto Compliance: A Comprehensive Guide post image

Crypto Compliance: A Comprehensive Guide

For years, digital assets operated in a legal gray area, a frontier where innovation outpaced the reach of regulators and law enforcement. In this early “Wild West” phase of finance, crypto startups thrived under minimal oversight. That era, however, is coming to an end. The importance of crypto compliance has become paramount as cryptocurrency has […]

Author: Bryce S. Robins

Link to post with title - "Crypto Compliance: A Comprehensive Guide"
Supreme Court and Title VII: Implications for Reverse Discrimination post image

Supreme Court and Title VII: Implications for Reverse Discrimination

Earlier this month, the U.S. Supreme Court issued a decision in Ames v. Ohio Department of Youth Services vitiating the so-called “background circumstances” test required by half of federal circuit courts.1 The background circumstances test required majority group plaintiffs pleading discrimination under Title VII of the Civil Rights Act to meet a heightened pleading standard […]

Author: Matthew F. Mimnaugh

Link to post with title - "Supreme Court and Title VII: Implications for Reverse Discrimination"
SPACs Are Back, What You Need to Know post image

SPACs Are Back, What You Need to Know

Special purpose acquisition companies (better known as SPACs) appear to be making a comeback. SPAC offerings for 2025 have already nearly surpassed last year’s totals, with additional transactions in the pipeline. SPACs last experienced a boom between 2020–2021, with approximately 600 U.S. companies raising a record $163 billion in 2021. Notable companies that went public […]

Author: Dan Brecher

Link to post with title - "SPACs Are Back, What You Need to Know"
Short Form Merger: Streamlining the Process for Businesses post image

Short Form Merger: Streamlining the Process for Businesses

Merging two companies is a complex legal and business transaction. A short form merger, in which an acquiring company merges with a subsidiary corporation, offers a more streamlined process that involves important corporate governance considerations. A short form merger, in which an acquiring company merges with a subsidiary corporation, offers a more streamlined process. However, […]

Author: Dan Brecher

Link to post with title - "Short Form Merger: Streamlining the Process for Businesses"
Tariff Response Options for Small Businesses Facing Financial Distress post image

Tariff Response Options for Small Businesses Facing Financial Distress

The Trump Administration’s new tariffs are having an oversized impact on small businesses, which already tend to operate on razor thin margins. Many businesses have been forced to raise prices, find new suppliers, lay off staff, and delay growth plans. For businesses facing even more dire financial circumstances, there are additional tariff response options, including […]

Author: Brian D. Spector

Link to post with title - "Tariff Response Options for Small Businesses Facing Financial Distress"
Common Causes of Partnership Disputes and How to Resolve Them post image

Common Causes of Partnership Disputes and How to Resolve Them

Business partnerships, much like marriages, function exceptionally well when partners are aligned but can become challenging when disagreements arise. Partnership disputes often stem from conflicts over business strategy, financial management, and unclear role definitions among partners. Understanding Business Partnership Conflicts Partnership conflicts place significant stress on businesses, making proactive measures essential. Partnerships should establish detailed […]

Author: Christopher D. Warren

Link to post with title - "Common Causes of Partnership Disputes and How to Resolve Them"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!