CISO Corner: The NYSE & the SEC; Ransomware Negotiation Tips

CISO Corner: The NYSE & the SEC; Ransomware Negotiation Tips

June 28, 2024 at 04:15PM

Wireless providers prioritize uptime and lag time at the expense of security, leaving users vulnerable to attacks. At Black Hat 2024, Penn State researchers will reveal how hackers can exploit 5G to intercept Internet traffic, leading to spying and phishing. The researchers have reported vulnerabilities to 5G vendors, but a more permanent solution requires securing 5G authentication with public key infrastructure.

Key takeaways from the meeting notes are as follows:

– Wireless service providers prioritize uptime and lag time over security, potentially allowing attackers to exploit vulnerabilities and compromise user data.
– A team of seven Penn State University researchers will be presenting at Black Hat 2024 in Las Vegas, explaining how hackers can exploit 5G to intercept Internet connections and engage in activities such as spying and phishing.
– The researchers have reported discovered vulnerabilities to 5G mobile vendors, who have deployed patches as a result.
– Securing 5G authentication is highlighted as a more permanent solution, potentially involving the use of public key infrastructure (PKI), though it is noted that deploying PKI can be expensive and present non-technical challenges.

These key points summarize the potential security risks associated with 5G and the efforts being made to address them.

Full Article