Remove tag cyber-attack
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

At CanSecWest 2022, researcher Martin Herfurt announced a new tool, TeslaKee.com , which he hopes prevents wireless key attacks from happening. This has turned into a RFID tag, which is a fob that you carry in your pocket and the fob reaches out to the car and it will unlock the car or lock the car. And then there's the relay attack.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. ” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

In the 1950s we started to get early operating systems, and these included supervisory programs that helped manage the data coming in and going back out. With SQL queries, I can do anomaly detection and detect cyber attacks. This started to get us to having more than one program run at a time. And the second thing is, databases.