Remove 11
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. In a YouTube video he shares the night he lost his entire apartment in the darkness, and is surprised that it stayed dark until he killed the program. So is this a feature, or is this a bug.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. In a YouTube video he shares the night he lost his entire apartment in the darkness, and is surprised that it stayed dark until he killed the program. So is this a feature, or is this a bug.

IoT 52
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The biggest changes since our debates on the Data Protection Act 1998, or even the early stages of the GDPR, which I was involved in as a Minister at the MoJ from 2010 to 2013, is that the threat to civil liberties and personal freedoms now comes not only from agencies of the state but from corporate power as well.

GDPR 120