Remove 2010 Remove Events Remove Manufacturing Remove Video
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Even so, the car manufacturers carved out large groups of codes. Since then, car manufacturers have improved on this. And the coffee spur was an attempt to show manufacturers of hands free sets that pre-programmed pin that cannot be changed by the user would not be the ideal way to handle security in this respect.

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

One “holy s**t” moment for me was a piece on ocean acidification , relating scientific discoveries that the oceans are turning acidic at a pace faster than any time since a mass extinction event 300 million years ago. Predictions 2010. 2010: How I Did. The world of the automobile moves slowly. 2013: How I Did.

Marketing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Clearly some proprietary information should be tightly controlled and guarded, and providing satisfactory legal access to events and evidence should be carefully thought through. Take a manufacturing firm operating on a just in time philosophy. However, another revolution has swept the world, making it flat. There are three Cs.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111