article thumbnail

RIM-brain in Movies and TV

The Texas Record

Near the end of the movie the Rebel Alliance infiltrates the Imperial Center of Military Research on the planet Scarif (i.e., Using his familiarity with the Imperial protocols, an Imperial ship, and an outdated Imperial authentication code, Rook convinced the controllers of the Shield Gate to let his ship full of Rebels into Scarif.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

For example, here’s Jerry Lewis in a scene from a 1950s film, where he’s trying to break into a Nazi German military base. But this method of authentication is flawed; either hashed or hashed and salted, usernames and passwords can still be stolen and reused. Fact is, we’ve long had passwords as a credential.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

In 2011, researcher Ang Cui showed how updates to common laser printers were not signed or otherwise authenticated, meaning that you might think you’re doing the right thing by applying an update when in reality you might be unintentionally installing malware. Supply chain compromises have been talked about for a few years now.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

In 2011, researcher Ang Cui showed how updates to common laser printers were not signed or otherwise authenticated, meaning that you might think you’re doing the right thing by applying an update when in reality you might be unintentionally installing malware. Supply chain compromises have been talked about for a few years now.

IT 52
article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Digital commerce from day one has revolved around companies bulling forward to take full advantage of wondrous decentralized, anonymous characteristics of the Internet, which began a military-academic experiment. Your recent white paper shows it’s still at as high a level as in 2017? This is true of the U.S. and other regions as well.

Cloud 157
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

You fill out a one page piece of paper and you get cyber insurance. You have to show to me that you're using multi factor authentication that you're doing vulnerability scanning and mitigation that you're harming your niche. There are hundreds of doctoral thesis papers that are being written right now. These are becoming.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. There's lots of different ways, maybe it's an old paper counter.