Remove insider-threats got-the-inside-threat-compromised-insiders-make-powerful-adversaries
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In this episode of The Hacker Mind , Beau Woods and Paulino Calderon discuss their book, Practical IoT Hacking, and talk about IoT threat models, the technologies being used today, and what tools and knowledge you need to get started successfully hacking IoT devices. How then does one start securing it? Funny thing.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In this episode of The Hacker Mind , Beau Woods and Paulino Calderon discuss their book, Practical IoT Hacking, and talk about IoT threat models, the technologies being used today, and what tools and knowledge you need to get started successfully hacking IoT devices. How then does one start securing it? Funny thing.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach

Krebs on Security

Importantly, none appeared to have suffered the sorts of attacks that typically preface a high-dollar crypto heist, such as the compromise of one’s email and/or mobile phone accounts. Taylor Monahan is founder and CEO of MetaMask , a popular software cryptocurrency wallet used to interact with the Ethereum blockchain. Then on Aug.

Passwords 345
article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

How do I measure it, and how do I make it better? And then the combination of the people with the tech against live adversaries or automated red teams, and really understanding and measuring how well you're doing, and then where to actually improve upon? Lee Rossi, CTO and co founder.of The premise is pretty basic.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

So how can you have all those powerful apps on your mobile with less overall memory? APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. Now, consider that your mobile probably has less overall memory than say your laptop.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

So how can you have all those powerful apps on your mobile with less overall memory? APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. Now, consider that your mobile probably has less overall memory than say your laptop.

article thumbnail

What’s most interesting about the Florida water system hack? That we heard about it at all.

Krebs on Security

Also, the changes he tried to make wouldn’t happen instantaneously. Stories about computer security tend to go viral when they bridge the vast divide between geeks and luddites, and this week’s news about a hacker who tried to poison a Florida town’s water supply was understandably front-page material.

IT 339