Nha-Khanh Nguyen

Consultant in IT security, Nha Khanh Nguyen has a strong interest for forensics, incident response but also the study of government malware and cybercrime. Moreover, she specializes in the security of medical IoT.
"Because a girl-to-girl conversation is so much more fruitful than a full classroom with only one or two women hiding in the corners. These are Marion Marschalek (@pinkflawd), words, organizer of the Blackhoodie workshop which, since this year, has become a real bootcamp.Taking place in the CIRCL's office in Luxembourg for its 3rd edition, the event focused on Reverse Engineering hosted from Friday 24th to Sunday 26th November 2017, a little less than 70 apprentice female reversers and even initiated ones. From all over the world and from lots of IT domains, developers network architects, cloud, data scientists, reversers and also lawyers gathered at this place. All share a common interest: the desire to be able to pown some malwares at the end of the weekend.
Everyone remembers the attack wave generated by the Mirai botnet at the end of 2016. The world of IoT, until then rather little targeted by malware, knows one of its first devastating botnets. This is a botnet network of more than hundreds of thousands of connected devices, including surveillance cameras. In recent days, a new threat has been identified by Checkpoint. Named IoTroop by some, Reaper by others, this new botnet has already collected more than a million pieces of equipment worldwide. The firm talks about "cyber-storm" which can make the entire Internet fall down. While this claim may seem somewhat exaggerated, this is the first time in the history of connected objects that malware has impacted so many organizations including healthcare institutions, transportation networks and various companies.
Armis Labs, a company specialized in IoT, has released a collection of 0day which affect almost all mobile devices but also main operating systems used in IT and IoT world. More precisely, these vulnerabilities are issued from Bluetooth protocol implementation, widely deployed within all kind of equipment. According to Armis, more than 8.5 billions of vulnerable devices have been found including 2 billions of Android, 2 billions of Microsoft Windows and 1 billion of Apple iOS.
Armis Labs, a company specialized in IoT, has released a collection of 0day which affect almost all mobile devices but also main operating systems used in IT and IoT world. More precisely, these vulnerabilities are issued from Bluetooth protocol implementation, widely deployed within all kind of equipment. According to Armis, more than 8.5 billions of vulnerable devices have been found including 2 billions of Android, 2 billions of Microsoft Windows and 1 billion of Apple iOS.
21st century, technology is everywhere. Connecting your watch or you toothbrush is becoming part of your daily life. Put all these connected objects together and you will have the Internet of Things. But depsite the revolutionnary aspect of the thing, people starts worrying about their privacy. Still, security is much more than privacy. Among confidentiality, integrity or data manipulaion, we can wonder what are the real issues of IoT ?