Remove tag do-not-call
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

And at the time, while you couldn't necessarily start the car, you still needed the fob to present when you hit the start button. And in this episode, I'm talking about hacking Tesla's or rather new product called Tesla key that prevents somebody from hacking into cars. So they could make calls, listened to music.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

So I called up someone from pico CTF, to learn more. Kearns: My name is Megan Kearns and I am the project manager for picoCTF, it's developed in CMU, out of the CyLab security and privacy Institute and I've been with CMU for 10 years, and I worked in silos, for all of those 10 years, doing different things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. when doing physical work, driving, walking, etc). only in German, sorry!)

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. And yet, everything we do requires electricity, either AC through the wire or DC in the form of a battery when it's gone. And it's all about the hacker mindset.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

million more this year according to Dave Martin, a product manager at EMC during his presentation about fusing Documentum to Sharepoint. million more this year according to Dave Martin, a product manager at EMC during his presentation about fusing Documentum to Sharepoint. (A Back in April, during the San Francisco Web 2.0

article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each). Not had a @haveibeenpwned notification! not as tech savvy).