Menu

M2M FEATURE NEWS

Hackers Highlight Vulnerabilities of Leading Smart Devices

By Ken Briodagh November 07, 2016

Smart devices and game engines used by millions of consumers, including Value Source, Huawei P9 Lite and PlayStation 4, were hacked by security experts at GeekPwn 2016, a hacking festival organized by advanced security engineering company KEEN and held simultaneously in Shanghai, China and Silicon Valley in the United States.

A total of 58 top security professionals from China, the United States, Russia and Singapore attended the event, including Open AI scientist Ian Goodfellow, legendary hacker Geohot, and CTF team Shellphish. At GeekPwn 2016, the attendees try to access or control various devices, reveal vulnerabilities and bugs, and warn related firms to fix them.

Smart devices were found to be less secure than previously thought. The top prize of about $50,000 (350,000 RMB) went to Nick Stephens from Shellphish, who discovered a chain of bugs in the Trust Zone of Huawei P9 Lite. Nick's exploitation successfully gained root privileges on the phone and executed remote code in Huawei's Trusted Execution Environment. With these vulnerabilities, hackers may be able to not only access sensitive data, but also get control of top authority operations like payment. These vulnerabilities can also be leveraged to exploit other models of the Huawei P-series including Huawei P8. Any Huawei devices using the Trust Zone code are likely vulnerable.

This kind of competitive security research is critical to the establishment of trust in the IoT industry, and has been a part of the IT security landscape for as long as we’ve had computers. More of these hackathons and white hat hacker events are needed, and their successes reported. As more vulnerabilities are fixed and patched, new ones become harder to find and the whole industry earns greater consumer and industrial trust. And therefore, it grows.

Hack on, you crazy diamonds. 




Edited by Alicia Young
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More