Remove 11
Remove 2013 Remove Definition Remove Retail Remove Risk
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So everybody kind of has their own definition, but the one that I tend to use as a working definition is anything that has computing power, conductivity and physical capability kinetic capability.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So everybody kind of has their own definition, but the one that I tend to use as a working definition is anything that has computing power, conductivity and physical capability kinetic capability.

IoT 52
article thumbnail

Council of the European Union Releases Draft Compromise Text on the Proposed EU Data Protection Regulation

Hunton Privacy

On May 31, 2013, the Council of the European Union’s Justice and Home Affairs released a draft compromise text in response to the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). Currently, the Presidency is held by Ireland, with Lithuania taking over on July 1 for the second half of 2013.