Remove tag privacy-rights
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Vamosi: I first became aware of Martin's work back in 2010 when I was writing when gadgets betray us, Martin had observed that certain manufacturers were using fixed pins such as 000 to make it easier for customers to pair their mobile devices with their cars. It's almost always like that with conferences and I totally get it right.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

For example, when learning a new subject area. Kearns: My name is Megan Kearns and I am the project manager for picoCTF, it's developed in CMU, out of the CyLab security and privacy Institute and I've been with CMU for 10 years, and I worked in silos, for all of those 10 years, doing different things. So what is CyLab.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Doctors can now use mobile devices to to tag patient condition and sending, for example, xrays from Africa to India by mobile network to be checked by doctors and diagnosed. Download Now 2010 IT Skills & Salary Report Global Knowledge Are you wondering how your salary compares to your colleagues? All rights reserved.

article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

In some ways ESME is more advanced than Twitter since it features user groups and tag clouds, enabling project based contextual messaging. Another example could be SAP insiders ‘following’ an influential architect in order to see what he thinks and shares, a common use of Twitter. All rights reserved.

Paper 45
article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email. 10 SharePoint deployment challenges Will Sharepoint 2010 work with Sharepoint 2007? All rights reserved.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Watching a whole bunch of things going on online in chats and forums you can put in little comments, especially if the conversation touches on some product by coincidence you just got for Christmas for example… And that was all the time I had with Steve - great opportunity and a fascinating day. All rights reserved.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

That's almost a cliched example to pull out these days, the point is simply that where there is sufficient will and resources, any information system can be compromised. I think the URL is right but it seems inaccessible from other countries: [link] — Troy Hunt (@troyhunt) January 9, 2018. Miscellaneous Observations.

Security 111