Monthly Archives: May 2014

Hacking Cars

A news bit about car hacking And Dr. Charlie Miller @0xcharlie presents how he has done this Car_Hacking_Hacktivity_2013_whitepaper What’s next? Well, eventually, there will be Google car hacking, I’m sure of it. Update 20140723. The good Dr. Charlie Miller will … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Hacking Cars

Smart TV Hacking

@beist from Korea. TVs are never really off, are they? Here are his slides (pdf).

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Smart TV Hacking

User Based (Health) Insurance?

I almost wanted a fitbit. I started to see a lot of them at work and in general. They seemed to grow in popularity like Crocs did 10 years ago. I decided to wait it out and watch people wear … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on User Based (Health) Insurance?

Google’s Driverless Car

Kawaii!! Here are some questions to ask though. What will become of the insurance industry if driverless cars become the norm? Will it still be mandatory in the US to have car insurance? What if someone hacks a car and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Google’s Driverless Car

Memorial Day 2014

We all went out to Lake Pleasant today and had a nice time out. For the time of year, the water sure was cold! After all these pictures, we met up with some old friends and some new. It was … Continue reading

Posted in Boating, life | Tagged | Comments Off on Memorial Day 2014

It’s Compliance Week: COSO

Technically, compliance week 2014 started yesterday. What is compliance week? Well, It’s a gathering from Compliance Week Magazine that puts together a 3-day networking event. You can be reached out to by event sponsors, you can chat with senior-level compliance … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on It’s Compliance Week: COSO

The Ponemon Institute’s Data Breach Study

In my opinion, the Ponemon Institute’s Cost of Data Breach Study is eye-opening. If you use a GRC tool that associates dollar amount loss per record, you should probably read this report and make the necessary changes. Increasing the cost … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Ponemon Institute’s Data Breach Study

Pat & Courtney’s Baby Shower/Mother’s Day

We hosted Pat and Courtney’s baby shower and had a lot of fun. A lot of people came over and had a good time. [AFG_gallery id=’27’] The last 20 or so photos are of mom getting her Mother’s Day gift

Posted in life | Comments Off on Pat & Courtney’s Baby Shower/Mother’s Day

Intel: 4238 Years to Crack My Password

According to this website that Intel has created: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html, it would take about 4238 years to crack my password. Which does make me wonder, it being Intel, that they are taking into account Moore’s law, which is the number of … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Intel: 4238 Years to Crack My Password

Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars

I tweeted this earlier today but didn’t have the chance to post the video. It immediately made me think of the 1995 movie, Hackers, with Jonny Lee Miller (aka Crash Override or Zero Cool) and Angelina Jolie. Ah, those were … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars