Remove tag do-not-call
Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Welcome to The Hacker Mind, an original podcast from for all secure. And in this episode, I'm talking about hacking Tesla's or rather new product called Tesla key that prevents somebody from hacking into cars. Herfurt: My name is Martin Herfurt and I'm a security researcher. So they could make calls, listened to music.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. It's basic privacy hygiene.

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. So I called up someone from pico CTF, to learn more.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. You know why it's called "Have I Been Pwned"? And every time I do a Google search for a major news outlet, I find this little website.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. He did wish they were doing more great things. estherschindler @olivermarks: @asacco’s q: How do location based services fit into the future of mobile social networking?

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email.