article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Fortunately, that didn't include driving functions, but it did include the ability to remotely manage the climate control and as you can see in the video embedded in that post, I warmed things up for my mate Scott Helme from the other side of the world whilst he sat there on a cold, damp, English night.

IoT 143
article thumbnail

Sounding the Alarm on Emergency Alert System Flaws

Krebs on Security

The DHS warning came in advance of a workshop to be held this weekend at the DEFCON security conference in Las Vegas, where a security researcher is slated to demonstrate multiple weaknesses in the nationwide alert system. The news video clip below about the 2018 event in Hawaii does a good job of walking through how the EAS works.

Passwords 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry. If it's coming from the original manufacturer or the airline that of course they want to keep things to themselves and protected in that sense. Government equipment is not easily accessible. It's classified.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

But it was really fella named Kai and his friend doc and some other people from Colorado and the 719 area code they they were the first to anyone really remembers in those early single digit days of DEF CON to start challenges and workshop tables. Still very informal. But at the same time, you know, it's still a political battle as well.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

The video within that story reiterates over and over again that "Aadhaar data cannot be breached" It then goes on to quote the government as saying that: it cannot be questioned by a handful of individuals. Other Insecure Content Embedded in the Page (and Commented out HTML).

Security 111
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. Black Mirror brainstorms, a workshop in which you create Black Mirror episodes. So here's the thing, SpyPhone is not an isolated incident.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

That was the single best financial decision we ever made and it happened well before my life as people know it today; there was no Pluralsight, no workshops, no speaking events or Have I Been Pwned or blog sponsorship - nothing. Lesson 8: Put a Price on Your Time - and Your Family I stopped playing video games probably about a decade ago.

Education 111