Remove tag twitter
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Even so, the car manufacturers carved out large groups of codes. Since then, car manufacturers have improved on this. And the coffee spur was an attempt to show manufacturers of hands free sets that pre-programmed pin that cannot be changed by the user would not be the ideal way to handle security in this respect.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. And that's actually far more important, so I would say it's the human factor talks at conferences like Black Hat, that are the most important ones. Both involve technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

For example, re-packing corporate records can help weave a narrative to promote a brand, enhance corporate social responsibility outreach programs, improve employee loyalty, enhance diversity, equality and inclusion training, and highlight environment, social and governance initiatives. Content Marketing Platforms (CMP).

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Yeah, there are tracks at conferences, but it hasn't yet exploded into the mainstream. And I remember asking questions, who were the manufacturers? There's a little security tag they put to see if someone is tampered with it but they are not locked. Vamosi: It is true that embedded security has been underground.