Remove tag do-not-call
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

And in this episode, I'm talking about hacking Tesla's or rather new product called Tesla key that prevents somebody from hacking into cars. So they could make calls, listened to music. It was also much easier for Martin to pair his device and in doing so listen in a nearby conversations in nearby cars. It wasn't very robust.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

For example, when learning a new subject area. So I called up someone from pico CTF, to learn more. And so we don't have faculty that are home department CyLab or students that are home department CyLab you belong to other departments, you do your research on security and privacy and CyLab. In a moment we'll hear from someone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

The subject of this cloud has nothing – directly – to do with digital media, marketing, technology or platform ecosystems – the places where I focus much of my writing. If you’re wondering what’s made me feel this way, a couple of choice articles from 2013 (and there were too many to count) should do the trick.

Marketing 111
article thumbnail

Applying Turing's Ideas to Search

ChiefTech

When I select a term from a tag cloud, retrieve all documents tagged with that term and order them by their popularity scores. Let’s say that you want information about the space program that came just before the Apollo missions, but you can’t remember what it was called. But search technology is different.

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email. Back in April, during the San Francisco Web 2.0 The road ahead for SharePoint users is less clear.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

He did wish they were doing more great things. estherschindler @olivermarks: @asacco’s q: How do location based services fit into the future of mobile social networking? Oliver Marks: How do you think you can make mobile usage a more human experience? There’s nothing I can do with that number of people.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Many people are doing that just now, including myself regarding that "hack-proof" claim.

Security 111