UNIVERSITY OF JYVÄSKYLÄ
MODERN TECHNOLOGIES AND
CYBERSECURITY November 13th, 2018
MODERN TECHNOLOGIES AND
CYBERSECURITY
VADIM DAVYDOV
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !2
Table of contents
1. Introduction

2. Mobile applications

3. Electric cars

4. IoT threats

5. Crypto currency 

6. Global threats

7. Conclusions
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !3
A map of every device in the world which is connected to the Internet (2017, SHODAN)
Introduction
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !4
Mobile applications
Key App Statistics:
• The total number of mobile app downloads in 2017 – 197 billion (Source:
Statista)

• The total number of iOS app downloads in 2016 – 25+ billion (Source: App
Annie)

• The total number of Android app downloads in 2015 – 50 billions (Source:
Benedict Evans)

• The total number of Android app downloads in 2016 –  90 billion (App
Annie)
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !5
Example: GetContact Application (1/3)
February 2018 — the application identified numbers
using its users own contacts (simply, you can see
how people write your name in their contact books)
• Having installed it, user would know almost every caller by name and picture
• The app pulled up the caller’s personal data and photo from its database
But what about privacy?
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !6
Example: GetContact Application (2/3)
Source: kaspersky.com
The user agreement allowed developers to
transfer data to any third party and
contained a clause forcing the user agree to
receive mass e-mails / messages
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !7
Example: GetContact Application (3/3)
Source: trends.google.com
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !8
Example: Spoofing in mobile applications
April 2017, Paris — “Privacy Threats
through Ultrasonic Side Channels on
Mobile Devices”

According to that study, smartphone
apps have been silently spying on
users
Researchers discovered 234 applications constantly listening for ultrasonic
beacons that can reveal human activity
Two of them had been downloaded between 1 million to 5 million times
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !9
IoT threats
Building automation — the automatic centralised control of a building's heating, ventilation
and air conditioning, lighting and other systems through a building management system or
building automation system. (Source: wikipedia.org)
What about privacy?
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !10
IoT threats
Source: youtube.com (Sberbank)
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !11
Example: iKettle
iKettle is a product of “Smarter” company 

Source: pentestpartners.com
In 2015 Ken Munro (Pen Test Partners) showed a way how to easily get a Wi-Fi
password using iKettle
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !12
Example: iKettle
Source: pentestpartners.com
Key steps:

• Social engineering. Using twitter
and 192.com he found the user of
the kettle and his address;

• Then he sent an antenna to
owner’s apartment and connected
the kettle to his access point:
• Sending fake disassociation
• Use the same SSID but higher
network power)

• Then he used brute force attack
to break the PIN of the kettle
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !13
Electric cars
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !14
Example: Tesla Motors
PKES systems based on the physical
proximity of a paired key fob.
Passive Keyless Entry and Start
Systems (PKES) — systems which
allow users to open and start the
vehicle using the key on the distance.
Tesla Motors key fob for starting the car
These systems are vulnerable to relay attacks (intercepting and manipulating
communication between the key fob and the car)
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !15
Example: Tesla Motors
Hacking Tesla S key fob
• To lock or unlock a car, Tesla Model
S key rings send an encrypted signal
based on a cryptographic key to a
car radio system

• However, key fobs (made by Pektron)
use weak ciphers (40-bit) to encrypt
such messages
Sequencing:

• Calculating all possible keys for
pairs;

• Attacking the key chain

• Forging the keys

Source: esat.kuleuven.be
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !16
Cryptocurrency: Bitcoin
Bitcoin is a cryptocurrency, a form of electronic cash

Officially, the creator is Satoshi Nakamoto but nobody saw him ever
Chart of Bitcoin price over the years (source: coindesk.com)
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !17
According to some researchers: 

• Bitcoin architecture was described in
the “White Paper” of American
intelligence long before the developer
appeared under the pseudonym
Satoshi Nakamoto

• “Satoshi Nakamoto’s” texts and code
are full of Americanisms

• A lot of work was done on the
implementation of Bitcoin itself
(design and programming), many
person-years were invested in it
Cryptocurrency: Bitcoin
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !18
What are the main threats connected with bitcoin?
• There is no control over payments or transactions

• Bitcoin is not a subject to control or regulation

• The cost of bitcoin is completely speculative
Cryptocurrency: Bitcoin
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !19
Global threats
What are global threats?
— these are threats which can damage the systems on the government
and country levels and change cardinally people’s facilities.
For example:

— American sanctions to some payment systems (switching off Visa and
MasterCard paying systems)

— malware which are directed to critical infrastructure facilities (such as electoral
system)

…
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !20
Global threats: Stuxnet
An attack to nuclear object in Iran
• 2009 — Stuxnet virus was detected in Iran (60% of infection total number)

• In February 2011, Symantec published a report “W32.Stuxnet Dossier”. It was
established that Stuxnet spread through five organisations, some of which were attacked
twice - in 2009 and in 2010.
Attacked organisations (according to Kaspersky Lab):

1) Foolad Technic Engineering Co

2) Behpajooh Co. Elec & Comp. Engineering

3) Neda Industrial Group

4) Control-Gostar Jahed Company

5) Kala Electric or Kala Naft
All these organisations are nuclear manufactures in Iran
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !21
Conclusions
— Cybersecurity is extremely important nowadays, and we have to pay a lot of
attention to this area;

— When buying something new and modern, we must be sure that it would be
safe for us;

— We should always be accurate with mobile applications, to read some
feedback and always check the data which the application uses;



— Every time if something is suspicious, we should ask ourselves a question:
“Is it a very useful thing for me or I could change it to something different?”
V. Davydov
MODERN TECHNOLOGIES AND
CYBERSECURITY
November 13th, 2018 !22
Q&A

More Related Content

PPTX
No Safety Without Security
PDF
Cybersecurity Technologies, Standards and Operations
PPTX
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
PDF
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
PPTX
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
PDF
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
PDF
CyberSecurity Vision: 2017-2027 & Beyond!
No Safety Without Security
Cybersecurity Technologies, Standards and Operations
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
CyberSecurity Vision: 2017-2027 & Beyond!

What's hot (19)

PDF
50+ facts about State of CyberSecurity in 2015
PDF
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
PDF
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
PDF
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
PDF
National Cybersecurity - Roadmap and Action Plan
PPTX
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
PDF
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
PDF
Kijiji 160616
PDF
When the Internet of Things becomes the Security of Things
PDF
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
PDF
Vladislav Iliushin: Dark side of IoT
PDF
2018 Cybersecurity Predictions
PDF
Development of National Cybersecurity Strategy and Organisation
PPT
State of Cybersecurity in 2018 - Our Top Predictions
PDF
What are the 5G network security issues?
PDF
Canarie kathryn anthonisen 16 9 rev
PDF
WTF Wearables
50+ facts about State of CyberSecurity in 2015
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
National Cybersecurity - Roadmap and Action Plan
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
Kijiji 160616
When the Internet of Things becomes the Security of Things
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
Vladislav Iliushin: Dark side of IoT
2018 Cybersecurity Predictions
Development of National Cybersecurity Strategy and Organisation
State of Cybersecurity in 2018 - Our Top Predictions
What are the 5G network security issues?
Canarie kathryn anthonisen 16 9 rev
WTF Wearables
Ad

Similar to Modern technologies and cybersecurity (20)

PDF
Overview of IoT and Security issues
PDF
Internet of things
PPTX
Cyber Security in the Manufacturing Industry: New challenges in the informati...
PDF
Conférence ENGIE ACSS 2018
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PDF
SCADA White Paper March2012
PDF
AI & Cybersecurity meet 21stC GeoPolitics
PDF
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
PDF
Cybersecurity | Risk. Impact. Innovations.
PPTX
Trust and the web veria 11 12- 09
PDF
Startup village 2014 trends extracts
PPTX
beware of Thing Bot
PDF
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
PDF
MTBiz November 2014
PPTX
Matthew Bailey IoT keynote IWCE2016 for linkedin
PDF
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
PPTX
Internet of things
PPTX
Internet of Things
PDF
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
PDF
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Overview of IoT and Security issues
Internet of things
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Conférence ENGIE ACSS 2018
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
SCADA White Paper March2012
AI & Cybersecurity meet 21stC GeoPolitics
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Cybersecurity | Risk. Impact. Innovations.
Trust and the web veria 11 12- 09
Startup village 2014 trends extracts
beware of Thing Bot
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
MTBiz November 2014
Matthew Bailey IoT keynote IWCE2016 for linkedin
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
Internet of things
Internet of Things
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Ad

Recently uploaded (20)

PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PPTX
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
PPTX
Unit IImachinemachinetoolopeartions.pptx
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
Solar energy pdf of gitam songa hemant k
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PPTX
chapter 1.pptx dotnet technology introduction
PDF
IAE-V2500 Engine for Airbus Family 319/320
PDF
Lesson 3 .pdf
PDF
Cryptography and Network Security-Module-I.pdf
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PDF
Research on ultrasonic sensor for TTU.pdf
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
Design ,Art Across Digital Realities and eXtended Reality
Agentic Artificial Intelligence (Agentic AI).pptx
Software-Development-Life-Cycle-SDLC.pptx
Environmental studies, Moudle 3-Environmental Pollution.pptx
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
Unit IImachinemachinetoolopeartions.pptx
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Solar energy pdf of gitam songa hemant k
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
AI-Reporting for Emerging Technologies(BS Computer Engineering)
IAE-V2500 Engine Airbus Family A319/320
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
chapter 1.pptx dotnet technology introduction
IAE-V2500 Engine for Airbus Family 319/320
Lesson 3 .pdf
Cryptography and Network Security-Module-I.pdf
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
Research on ultrasonic sensor for TTU.pdf
Beginners-Guide-to-Artificial-Intelligence.pdf

Modern technologies and cybersecurity

  • 1. UNIVERSITY OF JYVÄSKYLÄ MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 MODERN TECHNOLOGIES AND CYBERSECURITY VADIM DAVYDOV
  • 2. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !2 Table of contents 1. Introduction
 2. Mobile applications
 3. Electric cars
 4. IoT threats
 5. Crypto currency 
 6. Global threats
 7. Conclusions
  • 3. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !3 A map of every device in the world which is connected to the Internet (2017, SHODAN) Introduction
  • 4. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !4 Mobile applications Key App Statistics: • The total number of mobile app downloads in 2017 – 197 billion (Source: Statista)
 • The total number of iOS app downloads in 2016 – 25+ billion (Source: App Annie)
 • The total number of Android app downloads in 2015 – 50 billions (Source: Benedict Evans)
 • The total number of Android app downloads in 2016 –  90 billion (App Annie)
  • 5. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !5 Example: GetContact Application (1/3) February 2018 — the application identified numbers using its users own contacts (simply, you can see how people write your name in their contact books) • Having installed it, user would know almost every caller by name and picture • The app pulled up the caller’s personal data and photo from its database But what about privacy?
  • 6. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !6 Example: GetContact Application (2/3) Source: kaspersky.com The user agreement allowed developers to transfer data to any third party and contained a clause forcing the user agree to receive mass e-mails / messages
  • 7. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !7 Example: GetContact Application (3/3) Source: trends.google.com
  • 8. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !8 Example: Spoofing in mobile applications April 2017, Paris — “Privacy Threats through Ultrasonic Side Channels on Mobile Devices” According to that study, smartphone apps have been silently spying on users Researchers discovered 234 applications constantly listening for ultrasonic beacons that can reveal human activity Two of them had been downloaded between 1 million to 5 million times
  • 9. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !9 IoT threats Building automation — the automatic centralised control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system. (Source: wikipedia.org) What about privacy?
  • 10. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !10 IoT threats Source: youtube.com (Sberbank)
  • 11. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !11 Example: iKettle iKettle is a product of “Smarter” company Source: pentestpartners.com In 2015 Ken Munro (Pen Test Partners) showed a way how to easily get a Wi-Fi password using iKettle
  • 12. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !12 Example: iKettle Source: pentestpartners.com Key steps:
 • Social engineering. Using twitter and 192.com he found the user of the kettle and his address;
 • Then he sent an antenna to owner’s apartment and connected the kettle to his access point: • Sending fake disassociation • Use the same SSID but higher network power)
 • Then he used brute force attack to break the PIN of the kettle
  • 13. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !13 Electric cars
  • 14. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !14 Example: Tesla Motors PKES systems based on the physical proximity of a paired key fob. Passive Keyless Entry and Start Systems (PKES) — systems which allow users to open and start the vehicle using the key on the distance. Tesla Motors key fob for starting the car These systems are vulnerable to relay attacks (intercepting and manipulating communication between the key fob and the car)
  • 15. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !15 Example: Tesla Motors Hacking Tesla S key fob • To lock or unlock a car, Tesla Model S key rings send an encrypted signal based on a cryptographic key to a car radio system
 • However, key fobs (made by Pektron) use weak ciphers (40-bit) to encrypt such messages Sequencing:
 • Calculating all possible keys for pairs; • Attacking the key chain • Forging the keys Source: esat.kuleuven.be
  • 16. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !16 Cryptocurrency: Bitcoin Bitcoin is a cryptocurrency, a form of electronic cash Officially, the creator is Satoshi Nakamoto but nobody saw him ever Chart of Bitcoin price over the years (source: coindesk.com)
  • 17. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !17 According to some researchers: 
 • Bitcoin architecture was described in the “White Paper” of American intelligence long before the developer appeared under the pseudonym Satoshi Nakamoto • “Satoshi Nakamoto’s” texts and code are full of Americanisms • A lot of work was done on the implementation of Bitcoin itself (design and programming), many person-years were invested in it Cryptocurrency: Bitcoin
  • 18. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !18 What are the main threats connected with bitcoin? • There is no control over payments or transactions • Bitcoin is not a subject to control or regulation • The cost of bitcoin is completely speculative Cryptocurrency: Bitcoin
  • 19. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !19 Global threats What are global threats? — these are threats which can damage the systems on the government and country levels and change cardinally people’s facilities. For example: — American sanctions to some payment systems (switching off Visa and MasterCard paying systems) — malware which are directed to critical infrastructure facilities (such as electoral system) …
  • 20. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !20 Global threats: Stuxnet An attack to nuclear object in Iran • 2009 — Stuxnet virus was detected in Iran (60% of infection total number)
 • In February 2011, Symantec published a report “W32.Stuxnet Dossier”. It was established that Stuxnet spread through five organisations, some of which were attacked twice - in 2009 and in 2010. Attacked organisations (according to Kaspersky Lab):
 1) Foolad Technic Engineering Co
 2) Behpajooh Co. Elec & Comp. Engineering
 3) Neda Industrial Group
 4) Control-Gostar Jahed Company
 5) Kala Electric or Kala Naft All these organisations are nuclear manufactures in Iran
  • 21. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !21 Conclusions — Cybersecurity is extremely important nowadays, and we have to pay a lot of attention to this area;
 — When buying something new and modern, we must be sure that it would be safe for us;
 — We should always be accurate with mobile applications, to read some feedback and always check the data which the application uses;
 
 — Every time if something is suspicious, we should ask ourselves a question: “Is it a very useful thing for me or I could change it to something different?”
  • 22. V. Davydov MODERN TECHNOLOGIES AND CYBERSECURITY November 13th, 2018 !22 Q&A