The competition

Heres how the contest works.

Security researchers choose the equipment they would like to try and hack into at the time of registration.

They have to carry out the hack in a 30 minute time frame.

NFC is the new security threat, iPhone 5s, Galaxy S5 pwned in Mobile Pwn2Own

As always, the initial vulnerability used in the attack must be in the registered category, Gorenc explained.

The contestant must demonstrate remote code execution by bypassing sandboxes (if applicable) and exfiltrating sensitive information.

The vulnerabilities utilized in the attack must be unpublished zero days.

spot_img

Samsung Galaxy S5

The particular equipment was pawned not once, but twice.

He successfully managed to brute force a bluetooth connection between 2 devices using a 2-bug attack.

If this sounds familiar, it is a technique used very frequently on the hit series Person of Interest.

Lumia 1520

This machine might have turned out to be the most well protected.

This years Pwn2Own laid out interesting tactics on part of the hackers.

source: www.techworm.net