Remove Computer and Electronics Remove Conference Remove Cybersecurity Remove Military
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations. The thing is, that distinction between military and consumer products largely doesn't exist.

Military 103
article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years. military and intelligence agencies. Get ready for smart ground transportation.

IoT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

That work resulted in new SAE standards and lead to ISO 21434, a new standard focused on cybersecurity in automotive. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. Could we hack into an airplane, for example. Or a satellite in space?

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. Really bored. So I would take things apart. Mechanical things.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. Really bored. So I would take things apart. Mechanical things.