Remove Computer and Electronics Remove Course Remove Events Remove Manufacturing
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Device Security is Hard.

IoT 77
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

The event Sager and I spoke at was prior to the publication of Bloomberg Businessweek ‘s controversial story alleging that Supermicro had duped almost 30 companies into buying backdoored hardware. Of course, some nations have more capability than others to sift through huge amounts of data they’re collecting.

Security 209
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. The airline industry wrote it off as an unlikely scenario.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

You can do what's called a replay attack by capturing the codes and replaying them, or you can use a previously successful rollover sequence to calculate the key fob code of the next car from the same manufacturer. So you don't have one computer, you actually have many throughout the vehicle. If that's the best way to describe it.

article thumbnail

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Info Source

And of course there is a strong relationship nowaday between capture software and the hardware. Frequently in the past we have had hardware manufacturers ask us about software, not just capture and imaging but also document management software and solutions. I started to understand bigger printers and bigger computers.

Paper 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. is or what it controls. interact with it.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

The goal of course was to tell [.] The goal of course was to tell the proletariat what to think; telephony throughout the old Soviet block era was limited and frequently bugged. Take a manufacturing firm operating on a just in time philosophy. strategy, tactics, technology decisions and roll out. There are three Cs.