12
#kontakt_io Beacon Security Common attacks & how you can protect your beacons Webinar

Beacon Security

Embed Size (px)

Citation preview

Page 1: Beacon Security

#kontakt_io

Beacon SecurityCommon attacks & how you can protect your beacons

Webinar

Page 2: Beacon Security

3 Ways Beacons Can Be Attacked

Page 3: Beacon Security

An attacker can grab information being broadcast by your beacons and

● Add them to his or her application without your consent (Piggybacking)

● Put it into another beacon to mislead your users (Cloning)

Piggybacking & Cloning

Page 4: Beacon Security

By default, beacons don’t encrypt the data that is sent to them. The attacker can see the password you sent to connect to your beacon and then use it and change it, so you can’t connect anymore.

Hijacking

Page 5: Beacon Security

Cracking

An attacker can also physically removes your beacon from the wall, opens it up, and probes the memory directly.

Page 6: Beacon Security

How Businesses And Organizations Can Secure

Their Beacons?

Page 7: Beacon Security

Kontakt.io Secure

It is the world’s only complete suite of beacon security technology that fully protects your beacons against every kind of attack

available from October 15th, 2015

Page 8: Beacon Security

Kontakt.io Secure

It brings two new features: Kontakt.io Secure Shuffling

and Kontakt.io Secure Communication, and continues to protect

information by software lock

available from October 15th , 2015

Page 9: Beacon Security

Schedules your beacons to repeatedly change their identifiers. That means that anyone who has captured the data that the beacon transmitted in the past can no longer use your beacon's information to piggyback or clone your device.

Kontakt.io Secure Shuffling

Page 10: Beacon Security

Kontakt.io Secure Communication

Encrypts all the communication between your beacons and devices that manage them (like smartphones). This means that settings and configuration data are all transmitted securely and beacons can’t be hijacked.

Page 11: Beacon Security

Software Lock

Since the beginning, we’ve locked our beacons via Nordic Semiconducters’ on board firmware so data on Kontakt.io beacons can’t be read. Even if a hacker tries to extract data manually, he or she will be unable to, because the information is protected by a software lock on the device itself.