{"id":11057,"date":"2018-09-20T14:16:54","date_gmt":"2018-09-20T14:16:54","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=11057"},"modified":"2018-09-20T14:16:54","modified_gmt":"2018-09-20T14:16:54","slug":"everything-is-hackable","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/","title":{"rendered":"Everything is Hackable"},"content":{"rendered":"<p>Tens of thousands of hackers and computer security experts from around the world gathered in Las Vegas (USA) for two of the largest cybersecurity events worldwide: Black Hat and DEF CON.<\/p>\n<p>Dar\u00edo G\u00f3mez, security analyst at LACNIC, was one of the thousands of visitors who descended on Las Vegas to learn about the latest trends in security vulnerabilities and the hottest cyberattacks and for a week of networking with professionals from the five continents.<\/p>\n<p>The Black Hat conference is geared towards enterprises and focuses on commercial solutions, while DEF CON brings together the Internet hacker scene.<\/p>\n<p>G\u00f3mez noted that the Black Hat program covered everything from the fragility of many mobile devices and the Internet of Things to more specific issues such as taking over self-driving cars and many other topics.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-11053\" src=\"https:\/\/prensa.lacnic.net\/news\/wp-content\/uploads\/2018\/09\/blackhat.png\" alt=\"\" width=\"680\" height=\"330\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/blackhat.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/blackhat-300x146.png 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>Attended by approximately 7,000 participants, Black Hat is considered the most relevant annual security meeting in the Northern Hemisphere and presents a \u201ccommercial view\u201d of the tools for solving computer security issues as well as products to mitigate potential vulnerabilities of the devices connected to the Internet, G\u00f3mez observed.<\/p>\n<p>The conference includes workshops and other training activities and presents the latest global trends in cybersecurity. \u201cAt Black Hat you can see everything from the usual every-day problems to global trends. To prevent potential issues, people show you what they have done, without providing any details on how they actually did it. They make it clear that everything is hackable and that an any type of device can be breached,\u201d G\u00f3mez added.<\/p>\n<p>At DEF CON, G\u00f3mez was one of approximately 30 thousand attendees, a diverse crowd of security researchers, professionals and fans from all over the world attracted by this annual convention. \u201cAt DEF CON, people show you the things we break and how we break them. They share what they do,\u201d said the analyst.<\/p>\n<p>A recent development that created a buzz was car-hacking: unlocking a vehicle and accessing the on-board computer while the owner is away to open the car and start the engine. \u201cToday, practically all cars are managed by an on-board computer. Many people are trying to hack vehicles and while many are doing so in an attempt to improve the security of these devices, others have criminal intentions and manage to steal them,\u201d said G\u00f3mez.<\/p>\n<p>This meeting includes parallel sessions brimming with a spirit of collaboration, making it an ideal place for networking. Precisely this permanent exchange of knowledge was one of G\u00f3mez takeaways from DEF CON. \u201cI believe South America is lacking this type of selfless, constant networking; we are more hesitant when it comes to sharing knowledge. At DEF CON, like-minded people work in teams. They come together to share their knowledge and challenge themselves to find vulnerabilities. Everyone works together selflessly and contributes their knowledge,\u201d G\u00f3mez concluded.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tens of thousands of hackers and computer security experts from around the world gathered in Las Vegas (USA) for two of the largest cybersecurity events worldwide: Black Hat and DEF CON. Dar\u00edo G\u00f3mez, security analyst at LACNIC, was one of the thousands of visitors who descended on Las Vegas to learn about the latest trends [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,471],"archivo":[1345,859],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-11057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-warp-en","archivo-editions","archivo-september-2018-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Everything is Hackable<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Everything is Hackable\" \/>\n<meta property=\"og:description\" content=\"Tens of thousands of hackers and computer security experts from around the world gathered in Las Vegas (USA) for two of the largest cybersecurity events worldwide: Black Hat and DEF CON. Dar\u00edo G\u00f3mez, security analyst at LACNIC, was one of the thousands of visitors who descended on Las Vegas to learn about the latest trends [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-20T14:16:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Everything is Hackable\",\"datePublished\":\"2018-09-20T14:16:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\"},\"wordCount\":478,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png\",\"keywords\":[\"Cibersecurity\",\"WARP\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\",\"name\":\"LACNIC Blog | Everything is Hackable\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png\",\"datePublished\":\"2018-09-20T14:16:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everything is Hackable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Everything is Hackable","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Everything is Hackable","og_description":"Tens of thousands of hackers and computer security experts from around the world gathered in Las Vegas (USA) for two of the largest cybersecurity events worldwide: Black Hat and DEF CON. Dar\u00edo G\u00f3mez, security analyst at LACNIC, was one of the thousands of visitors who descended on Las Vegas to learn about the latest trends [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2018-09-20T14:16:54+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Everything is Hackable","datePublished":"2018-09-20T14:16:54+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/"},"wordCount":478,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","keywords":["Cibersecurity","WARP"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/","url":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/","name":"LACNIC Blog | Everything is Hackable","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","datePublished":"2018-09-20T14:16:54+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/everything-is-hackable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Everything is Hackable"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/09\/todo-hackeable.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":11052,"post_title":"Todo es hackeable","slug":"todo-es-hackeable","href":"https:\/\/blog.lacnic.net\/todo-es-hackeable\/"},{"locale":"pt_BR","id":11059,"post_title":"Tudo \u00e9 hacke\u00e1vel","slug":"tudo-e-hackeavel","href":"https:\/\/blog.lacnic.net\/pt-br\/tudo-e-hackeavel\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=11057"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11057\/revisions"}],"predecessor-version":[{"id":11058,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11057\/revisions\/11058"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/11054"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=11057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=11057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=11057"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=11057"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=11057"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=11057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}