article thumbnail

Episode 242: Hacking the Farm (and John Deere) with Sick Codes

The Security Ledger

In our latest podcast, Paul caught up with Sick Codes (@sickcodes) to talk about his now-legendary presentation at the DEF CON Conference in Las Vegas, in which he demonstrated a hack that ran the Doom first person shooter on a John Deere 4240 touch-screen monitor. Read the whole entry. » » Click the icon below to listen.

article thumbnail

50 Years Makes a Difference! How Film Research Has Changed Since the 1972 Conference on Audiovisual Archives

Unwritten Record

You may have heard that the National Archives is partnering with the University of Maryland Cinema and Media Studies Program to present Films of State , an online conference on government-produced moving images (if not, check out my last blog post for more background). In addition, “access” meant something completely different at the time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Renewable energy in action: Examples and use cases for fueling the future

IBM Big Data Hub

More than 110 countries at the United Nations’ COP28 climate change conference agreed to triple that capacity by 2030, and global investment in clean energy transition hit a record high of USD 1.8 trillion in 2023. But with all of this new capacity, how are renewable energy resources really being used? What is renewable energy?

article thumbnail

Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

The Security Ledger

Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream Monopoly Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture. The Black Hat Briefings cybersecurity conference kicks off tomorrow in Las Vegas , after a year that saw both Black Hat and DEFCON postponed.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Fowler sent a responsible disclosure notice when he discovered the database and it was secured the following day. It is not known how long the database was publicly available, nor whether anyone else accessed it. Date breached: 384,658,212 records. ALPHV/BlackCat ransomware gang adds 2.7 The total number of victims is now more than 5 million.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

In the Neolithic Revolution, early humans discovered agriculture, which helped establish early civilizations. Over the millennia, agriculture has used countless technologies to increase production. Part 3 will discuss how to manage the various DT risks. Enabling CS for DT.

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

This week, Chi-en (Ashley) Shen presented at the CONFidence cybersecurity conference held in Poland her analysis on new samples of malware associated with the ICEFOG group. The cyber mercenaries were recruited by governments and private companies, it was composed of highly skilled hackers able to conduct sophisticated attacks.