Check Point Press Releases

Vulnerabilities in WhatsApp, RDP, SQLite, and DSLR Cameras will be unveiled at Black Hat USA 2019 and DEF CON


San Carlos, CA  —  Mon, 05 Aug 2019

Check Point Software Technologies, a leading provider of cybersecurity solutions globally, will feature speakers from Check Point Research at Black Hat USA 2019 and DEF CON this month.

Black Hat USA, one of the biggest annual information security conferences, takes place at the Mandalay Bay Resort and Casino on Aug. 3-8. It features four days of hands-on workshops followed by a main conference on Aug. 7-8, with over 19,000 security professionals in attendance.

Check Point Vulnerability Researcher Eyal Itkin will co-present at Black Hat with Dana Baril, a security software engineer at Microsoft, on Aug. 7. They will reveal the latest RDP vulnerability that puts host devices at risk of compromise, the result of a design flaw in the Microsoft Terminal Services Client. Eyal and Dana will examine the issue from the perspective of both the attacker and the defender, offering a solution to combat this threat.

Check Point’s Head of Products Vulnerability Research, Oded Vanunu and Security Expert Roman Saikin will also take the stage at Black Hat on Aug. 7. They will reveal recent vulnerabilities in WhatsApp, discovered by reverse engineering its web source code and decrypting its traffic. Oded and Roman will discuss how attackers can exploit these vulnerabilities to intercept and alter messages sent in group and individual conversations with the purpose of spreading misinformation.

DEF CON follows Black Hat USA on Aug. 8-11 at Bally’s Las Vegas Hotel and Casino. As one of the top hacking conventions in the world, DEF CON hosts a variety of competitions and speakers throughout the weekend.

Check Point Security Researcher Omer Gull will present at DEF CON on Aug. 10, revealing vulnerabilities discovered in the SQLite database that could lead to Remote Code Execution. Gull and his research team illustrated these vulnerabilities by creating a rogue SQLite database that exploits the software used to open it.

Eyal Itkin will take the stage again on Aug. 11 at DEF CON. He will reveal new vulnerabilities discovered in DSLR cameras, and how attackers could hack into the Picture Transfer Protocol to hijack cameras remotely.

Follow Check Point via:
Twitter: https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

 

×
  피드백
본 웹 사이트에서는 기능과 분석 및 마케팅 목적으로 쿠키를 사용합니다. 웹 사이트를 계속 이용하면 쿠키 사용에 동의하시게 됩니다. 자세한 내용은 쿠키 공지를 읽어 주십시오.