Remove tag do-not-call
Remove 2010 Remove Government Remove Security
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Welcome to The Hacker Mind, an original podcast from for all secure. And in this episode, I'm talking about hacking Tesla's or rather new product called Tesla key that prevents somebody from hacking into cars. Herfurt: My name is Martin Herfurt and I'm a security researcher. So they could make calls, listened to music.

article thumbnail

President’s Council of Advisors on Science and Technology Release Health IT Report

Hunton Privacy

has been focused on the two reports issued in December 2010 by the Federal Trade Commission and the Department of Commerce , a third government report has received far less press attention, but may have a greater impact on U.S. While much of the attention of the privacy policy community in Washington, D.C. business and consumers.

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Many people are doing that just now, including myself regarding that "hack-proof" claim. India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2

Security 111
article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. He did wish they were doing more great things. estherschindler @olivermarks: @asacco’s q: How do location based services fit into the future of mobile social networking?

article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. The problem is universal to all enterprises, regardless of industry or private/government, and virtually every business unit within those organizations. Mike explores the lure of Web 2.0

Paper 40
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Named after a character from “Scooby-Doo,” the Creeper was originally intended as a security test for the U.S. As a security test, the Creeper’s effects on infected machines were minimal. Though polite, the Creeper was still an annoyance to some, and in 1971, Ray Tomlinson developed the first antivirus software , called Reaper.