Remove 10
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In a YouTube video he shares the night he lost his entire apartment in the darkness, and is surprised that it stayed dark until he killed the program. Calderon: As far as just the exercise, or the threat modeling thing. Problem is, MAC addresses are not great for authentication. So is this a feature, or is this a bug. I don't know.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In a YouTube video he shares the night he lost his entire apartment in the darkness, and is surprised that it stayed dark until he killed the program. Calderon: As far as just the exercise, or the threat modeling thing. Problem is, MAC addresses are not great for authentication. So is this a feature, or is this a bug. I don't know.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

It's something I certainly didn't understand 10 years ago, and I still remember the initial surprise when agencies started reaching out. It's a non-trivial exercise to index that (for all sorts of reasons), but it also seems like an increasingly worthy exercise. You could call it. So, what stands out?

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

So I originally had kind of participated in cyber stakes, way back in 2015. I found cyber stakes back in 2015 at the service Academy at the Coast Guard for me, and the military cares a little bit more about like the security of stuff like sure it's cool, you can make this. Hammond: I've tried to participate as much as I can.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. So, if I want to know more about the types of questions I’ll encounter in a particular CTF, I’ll just watch John’s videos.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. So, if I want to know more about the types of questions I’ll encounter in a particular CTF, I’ll just watch John’s videos.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Still, this has been a useful exercise to understand not just how the various entities relate to each other, but also because it shows that the scope of this issue isn't just constrained to kids, it affects the elderly too.

Passwords 111