Remove Authentication Remove Events Remove Mining Remove Video
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Fortunately, that didn't include driving functions, but it did include the ability to remotely manage the climate control and as you can see in the video embedded in that post, I warmed things up for my mate Scott Helme from the other side of the world whilst he sat there on a cold, damp, English night.

IoT 143
article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

All pretty cutting edge in the spirit of this conference which is a personal favorite of mine. The first year all event info came on an ipod, last year attendees received an iphone (or a PS3 if they already had an iphone). Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

They had a reporter in the driver's seat on a Missouri interstate during rush hour, and captured on video how the researchers remotely turned off the brake system. The Secure Gateway requires registration and authentication through an approved device for aftermarket use. This interview was actually recorded just before that event.

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

to customers to noteworthy events since conception to a slide on "Industry Tailwinds" talking about how big cyber is becoming (that hurt a little bit to put my name on, so much cyber.). I built and launched the authenticated API and payment process (I really should have doe this earlier, I'm so happy with it!) of the company.

IT 136