Blog Stats
- 75,849 hits
Monthly Archives: May 2014
Hacking Cars
A news bit about car hacking And Dr. Charlie Miller @0xcharlie presents how he has done this Car_Hacking_Hacktivity_2013_whitepaper What’s next? Well, eventually, there will be Google car hacking, I’m sure of it. Update 20140723. The good Dr. Charlie Miller will … Continue reading
Posted in Security Blog
Tagged 2014, car hacking, Charlie Miller, Chris Valasek, python, video tutorial
Comments Off on Hacking Cars
Smart TV Hacking
@beist from Korea. TVs are never really off, are they? Here are his slides (pdf).
Posted in Security Blog
Tagged 2014, black hat, hacked, hacking, rootkits, samygo, SeungJin Lee, smart tv hacking
Comments Off on Smart TV Hacking
User Based (Health) Insurance?
I almost wanted a fitbit. I started to see a lot of them at work and in general. They seemed to grow in popularity like Crocs did 10 years ago. I decided to wait it out and watch people wear … Continue reading
Google’s Driverless Car
Kawaii!! Here are some questions to ask though. What will become of the insurance industry if driverless cars become the norm? Will it still be mandatory in the US to have car insurance? What if someone hacks a car and … Continue reading
Posted in Security Blog
Tagged 2014, Curious Questions, driverless cars, Google, insurance
Comments Off on Google’s Driverless Car
Memorial Day 2014
We all went out to Lake Pleasant today and had a nice time out. For the time of year, the water sure was cold! After all these pictures, we met up with some old friends and some new. It was … Continue reading
It’s Compliance Week: COSO
Technically, compliance week 2014 started yesterday. What is compliance week? Well, It’s a gathering from Compliance Week Magazine that puts together a 3-day networking event. You can be reached out to by event sponsors, you can chat with senior-level compliance … Continue reading
Posted in Security Blog
Tagged 2014, compliance, compliance week, coso
Comments Off on It’s Compliance Week: COSO
The Ponemon Institute’s Data Breach Study
In my opinion, the Ponemon Institute’s Cost of Data Breach Study is eye-opening. If you use a GRC tool that associates dollar amount loss per record, you should probably read this report and make the necessary changes. Increasing the cost … Continue reading
Posted in Security Blog
Tagged 2014, breach, ponemon, quantitative, risk, risk analysis, study, values
Comments Off on The Ponemon Institute’s Data Breach Study
Pat & Courtney’s Baby Shower/Mother’s Day
We hosted Pat and Courtney’s baby shower and had a lot of fun. A lot of people came over and had a good time. [AFG_gallery id=’27’] The last 20 or so photos are of mom getting her Mother’s Day gift
Posted in life
Comments Off on Pat & Courtney’s Baby Shower/Mother’s Day
Intel: 4238 Years to Crack My Password
According to this website that Intel has created: https://www-ssl.intel.com/content/www/us/en/forms/passwordwin.html, it would take about 4238 years to crack my password. Which does make me wonder, it being Intel, that they are taking into account Moore’s law, which is the number of … Continue reading
Posted in Security Blog
Tagged 2014, Bruce Schneier, encryption, password safe, passwords, truecrypt, twofish
Comments Off on Intel: 4238 Years to Crack My Password
Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars
I tweeted this earlier today but didn’t have the chance to post the video. It immediately made me think of the 1995 movie, Hackers, with Jonny Lee Miller (aka Crash Override or Zero Cool) and Angelina Jolie. Ah, those were … Continue reading
Posted in Security Blog
Tagged 2014, hackers, traffic lights
Comments Off on Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars