Be Afraid! 8 New Hacks From the Black Hat Conference That Should Scare You.At this year's Black Hat Conference, hackers gathered to share their dirtiest hacking secrets. Here's what you can learn from them.

ByGrace Reader

Opinions expressed by Entrepreneur contributors are their own.

Black Hat

At least11,000 hackers from more than 108 countriesdescended on Las Vegas this week for the 19th annualBlack Hatconference. The message for everyone: You should be worried about cyber-security.

The hackers came together to show off their best hacking tricks -- in the name of security, of course. The goal is to help find bugs and loopholes in security systems so they can be fixed.

去年,查理·米勒和克里斯Valasek headlines after their remote hack into a Jeep's computer system. They even tested the hack on60 Minutes. Fiat Chrysler had to recall1.4 million vehiclesbecause of the stunt.

This year, Miller and Valasek raised the stakes, and hackers around the world revealed their darkest secrets. Here are eight takeaways from this year's conference that might scare you:

Related:Make Sure Your SEO is Wearing a White Hat.

1. Even your light bulbs can be hacked.

The Internet of Things undoubtedly can help you with day-to-day tasks, and that's what hackers are counting on.

A presentation by the CTO ofNewAE Technology, Colin O'Flynn, and Eyal Ronen, an Israeli graduate student, provided details on a cyber-security nightmare, a bug spreading between the Internet of Things and smart devices.

The teamshareddrone video of hacking office building lights -- and then they hacked the lights at the conference.

2. Be careful what you click on when using social media.

ZeroFOXsenior data scientist Philip Tully and data scientist John Seymour showed that the content on your social media accounts may not always be what it seems.

The team built a bot that canphish social media users, sending messages that got them to hand over their personal information and ultimately, their money.

This phishing smart bot locates a target, gets to know the target's interests and then infiltrates his or her feed with a catered message. Its creators saw as high as a60 percentclick through rate.

3. Chip-and-PIN credit cards can be easily hacked.

Although banks are touting chip-and-PIN credit cards as being a safer alternative to the swipe versions, one of the highlights of this year's conference was to prove the exact opposite.

Multiple researchersdemonstratedthat it actually takes only small modifications to equipment to bypass the protections on chip-and-PIN cards to enable unauthorized payments.

4. Your car still isn't safe.

Last year, Charlie Miller and Chris Valasek became hacking stars when they broke into a jeep's computer system, causing Fiat Chrysler to recall cars. This year the pair are back at it.

Instead of just controlling the speed of the car, the team demonstrated this year that they canturn the steering wheelfrom a laptop in the back seat, which caused the SUV to dramatically crash into a ditch. It's safe to say Fiat Chrysler isnot happy.

Related:5 Growth-Hacking Myths for Software Entrepreneurs

5. Nobody is safe, not even hackers.

You would think that the team that puts on one of the biggest hacking events in the world would be able to keep hackers at bay, but evenBlack Hat can get hacked.

In the network operations center of Black Hat, a team of volunteers worked to keep the Wi-Fi safe from the 11,000 hackers in attendance.

The Wi-Fi did get hacked, but it was just a practical joke. There was a spike in traffic for two and a half minutes, which was a string of text reading "I <3 Grifter" (Grifter being a comic book hero) and then "Thanks for having a sense of humor."

6. Don't pick up USBs and plug them into your computer.

Yes, that shiny new USB laying on the ground might seem like a blessing, but it's not, so please don't put it in your computer.

Google researcher Elie Bursztein ran astudywhere she dropped nearly 300 USB drives on a college campus. Of those dropped, 98 percent were picked up and 45 percent were plugged into a computer.

While this was just a study that had "call home" software on it, systems could be hacked with malware-infected USB drives.

7. Even Apple is asking hackers for help against hackers.

You might think you're smart enough to avoid getting hacked, but if Apple is requesting help, you might want to rethink that.

At this year's conference, Apple introduced its first security bounty program, which offers hackers that found loopholes an up to$200,000prize.

8. Short-term rentals are becoming a hot hacking destination.

Jeremy Galloway fromAtlassiandetailed how public trust for short-term rental companies such as AirBnB might help hackers.

It's not AirBnB's actual software that's the problem, but rather the way guests and hosts are using the Wi-Fi at the rental locations. If a hacker gains access to the Wi-Fi access point, they couldinstall malware and even gain access to the network's traffic.
Wavy Line
Grace Reader

Contributor

Grace Reader is a former editorial intern at Entrepreneur.com and a current freelance contributor. She is a third year journalism and media communication major at Colorado State University. Grace is the PR and marketing manager at Colorado State University's Off-Campus Life, and a sports anchor at CTV Channel 11.

Editor's Pick

Related Topics

Business Solutions

Learn to Program an AI Chatbot for Your Business in This $30 Course

Get back-to-school savings on this AI coding course.

Business Ideas

55 Small Business Ideas to Start in 2023

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2023.

Data & Recovery

Get 1TB of Cloud Storage for Life for $119.97 With This Back-to-School Sale

This 1TB Cloud Storage Solution Is Only $119.97 for Back to School

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

企业家是不能过度指狗万官方望太多a company exit for their eventual 'win.' Do this instead.

Leadership

This Common Leadership Habit Will Harm Your Credibility. Are You Guilty of It?

As leaders, we're always looking for ways to build credibility among peers and employees. But this easy-to-make mistake can ruin it in an instant.