Remove tag rfid-user-authentication
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Here, Part 1 discusses the key DT business drivers, concepts, and technology trends, how they are transforming organizations and society, and how the trends are affecting business users and customers. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Introduction.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

So what this petty thief did, he walked around Prague looking for a new Mercedes, and then he used his laptop and an RFID antenna to generate all the possible combinations for a Mercedes keycode until one hit and he did it again. So if you wanted a Mercedes you only needed to generate the keys in a particular range. And he did it again.