(See our roundup of all Black Hat and Defcon stories).
[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":202428,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,media,security,","session":"C"}']The two videos below show the Q&A session that took place immediately after he hacked two different Windows CE-based ATMs. During the Q&A, an engineer for one of the ATM companies, Triton, got up and offered some answers about his company’s efforts to patch the vulnerabilities that Jack pointed out on stage.
Jack was scheduled to give the talk a year ago, but it was canceled after an ATM vendor objected to his then-employer, Juniper Networks. This year, Jack switched jobs to IOActive. The ease with which he hacked the machines should be a wake-up call for banks.
AI Weekly
The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.
Included with VentureBeat Insider and VentureBeat VIP memberships.
Jack showed how you could walk up to an ATM, break into it using a common universal key, and then use a universal serial bus (USB) stick to load a rootkit, or hacking software, that could compromise the machine’s security. On stage, he showed how he could run a program that could talk over the machines and get them to display “jackpot!” on the ATM screen and then spit out bills.
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More