Remove tag cyber-attack
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Additionally, cyber-attacks against the human body through the devices is a real (and terrifying) threat. What is required by the General Data Protection Regulation (GDPR) or equivalent statutes for health and genetics or for sensitive personally identifiable information? What are the company’s biometrics obligations?

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

At CanSecWest 2022, researcher Martin Herfurt announced a new tool, TeslaKee.com , which he hopes prevents wireless key attacks from happening. This has turned into a RFID tag, which is a fob that you carry in your pocket and the fob reaches out to the car and it will unlock the car or lock the car. And then there's the relay attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. Future I often joke about my life being very much about getting up each morning, reading my emails and events from overnight and then just winging it from there.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

With SQL queries, I can do anomaly detection and detect cyber attacks. With a database operating system, you’ll known in milliseconds if you’ve been attacked with malware. We can come up with a cyber deterrence concept, which would be determined on the basis of denying benefit. They'll eventually stop.