Remove Manufacturing Remove Mining Remove Passwords Remove Video
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Fortunately, that didn't include driving functions, but it did include the ability to remotely manage the climate control and as you can see in the video embedded in that post, I warmed things up for my mate Scott Helme from the other side of the world whilst he sat there on a cold, damp, English night.

IoT 143
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. Vamosi: I first became aware of hash after the Texas freeze, in particular hash and published a video on YouTube showing him driving around the streets of Dallas.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

You can do what's called a replay attack by capturing the codes and replaying them, or you can use a previously successful rollover sequence to calculate the key fob code of the next car from the same manufacturer. Vamosi: The exact number of these ECUs varies depending on the price of the car or the needs of the manufacturer.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. Who else has access to something that's, that's not uncommon, interviewed that, for example, someone still had someone share Facebook passwords.

article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

Compromised Credentials Compromised identities from phishing, info stealers, keyloggers, and bad password habits provide the entry point for most ransomware attacks and data breaches. 583% increase in Kerberoasting [password hash cracking] attacks. 64% of managers and higher admit to poor password practices.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

Then there was CloudPets leaking kids voices because the "smart" teddy bears that recorded them (yep, that's right) then stored those recordings in a publicly facing database with no password. Wearco produces "mining consumables". mSpy leaked data. Cellnet is a publicly listed company with a heap of different brands.

Passwords 111