The IT Pro Podcast: Meet the cyborg hacker
Resistance is futile - offensive biotech implants are already here
The technological arsenal available to cyber criminals is already enough to give any security professional nightmares, but there’s another emerging threat on the horizon that may keep them up at night: bio-augmented hackers. Implantable chips and other modifications are growing in capability and sophistication, and there are a variety of creative ways that attackers can use them to carry out both physical and device-based attacks -
This is made all the more concerning by the fact that these implants are all but impossible to detect. This week, we’re joined by CyberArk technical evangelist, white hat hacker and self-described transhumanist Len Noe to find out what kind of augmentations cyber criminals currently have access to, how can they be used in intrusions, and why the industry needs to start preparing for their implementation now - as well as some of the positive uses that this technology can be put to.
Highlights
“Would you like me to tell you how I get through an airport? I put the left foot in front of the right and then I repeat. That's it… There is not enough combined metal in all of my implants to actually trigger a magnetometer… even if I'm doing the X-ray metal detector, [it] doesn't show up, I can walk straight through, the magnetometer will not trigger.”
“I know that I'm using it. I know of quite a few people who are on red teams that are using this technology. We have not found any indications from any type of incidents that have actually happened in the wild where implants were shown to be the root cause, but at the same time, how would you be able to determine that - and therein lies the problem.”
“From… an actual implementation perspective, there is currently no way to actually detect an augmented human with this type of technology inside the body. And that becomes a very large problem for security professionals. And the only way that I can really give as a way to try and combat this is a true defence in depth, and a layered security approach.”
Read the full transcript here.
Footnotes
- The IT Pro Podcast: The secret life of hackers
- Stories from the front line: The secrets of the Red Team revealed
- Trade Unions Congress fearful of implanting workers with tracking chips
- Should employees be microchipped?
- What is Neuralink?
- ARM fights paralysis with brain implant chips
- What is penetration testing?
- Should human augmentation technology be regulated?
- IT Pro 20/20: The future of augmentation
- The IT Pro Podcast: Can technology make us more than human?
- The IT Pro Podcast: Should companies spy on their employees?
- BSidesSF 2022 - Biohacker: The Invisible Threat (Len Noe) - YouTube
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25
-
High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware
-
Pentesters are now a CISOs best friend as critical vulnerabilities skyrocketNews Attack surfaces are expanding rapidly, but pentesters are here to save the day
-
Getting a grip on digital identityITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
-
Let’s talk about digital sovereigntyIn the age of AI and cloud, where data resides is a key consideration
-
Can cyber group takedowns last?ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
July rundown: Salt Typhoon and SharePoint scaresITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
-
Can the UK ban ransomware payments?ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
-
We need to talk about operational technologyITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks
-
Cyber professionals call for a 'strategic pause' on AI adoption as teams left scrambling to secure toolsNews Security professionals are scrambling to secure generative AI tools
