You’ve seen these types of attacks in movies and TV shows, but did you think that it was just good editing and special effects? Did you know that these don’t just take place on the silver screen? In fact, they can be carried out in places that you wouldn’t even expect… such as your office, whether it is in the center of the city, or your home in a quiet neighborhood… Check out these videos of how these types of attacks are carried out, and visit www.sepiocyber.com to learn more!
On December 23, 2015 the Ukrainian reported a cyber attack on power plants, they have blamed the Russian government for these attacks. Following reports from these attacked facilities operators were that they could see someone controls their mouse cursors and could not stop it. Our team in the US thought it would be interesting to try something similar by remotely controlling a keyboard and sending keystrokes from a remote location. They have assembled an off-the-shelf demo payload that was carried on a drone to “attack” our new Chief Revenue Officer.
Check out this video and talk to us about HAC-1, the first Hardware Access Control System that delivers full visibility, control and mitigation from networked devices to endpoint peripherals.