Electric cars are attracting more buyers than ever before. Although the now more sporting looking vehicles may be better for the environment, they pose a great risk to the power grid. Not only are power grid segments in some cities already too overly burdened to sustain increased usage by a multitude of charging electric cars, the “refueling” stations themselves are reportedly extremely susceptible to cyber hacking.
There has been much sniggering into sleeves after wags found they could upset iOS 6 iPhones and iPads, and Macs running OS X 10.8, by sending a simple rogue text message or email.
A bug is triggered when the CoreText component in the vulnerable Apple operating systems tries to render on screen a particular sequence of Unicode characters: the kernel reacts by killing the running program, be it your web browser, message client, Twitter app or whatever tried to use CoreText to display the naughty string.
L33tdawg: An interview with Microsoft's Katie Moussouris shot at #HITB2013AMS in May.
NATO has released a short video, looking at the “hacker” phenomenon.
By hackers they aren’t just talking about the stereotypical malicious hacker, bent over a keyboard in a darkened room while wearing a hoody (although one of them does appear in the video), but also vulnerability researchers who find security holes in systems.
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. He talks about security management, fraud, identity management, governance, risk and compliance.
The organizers of the Hack In The Box (HITB) security conference have managed to publish the complete videos of all the talks from #HITB2013AMS.
So, in case you haven’t made it to the conference, or if you want to take another look at one of the many interesting presentations, check out the official HITB YouTube channel.
Back in April, we attended the 2013 Amsterdam edition of the Hack in the Box (HITB) security conference. One of the many interesting presentations was made by ERNW security researcher Daniel Mende, who demonstrated how high-end cameras can be remotely hacked.
Mende showed the audience several ways in which hackers can access the information stored on Canon EOS 1DX cameras, a model utilized by many professionals, including Reuters journalists.
L33tdawg: Video of their talk from #HITB2013AMS is available on YouTube.
Products frequently follow a trajectory from customized prototypes to mass-produced goods, and -- when the market matures -- manufacturers typically find ways to lure consumers by allowing efficient customization.
Is there anything more annoying than infrastructure that turns on you?
For years we've been warned about the specter of hacker-induced nuclear power plant meltdowns, breached electric-grid control systems or Samsung TVs that let hackers watch you. We've even heard we could lose our data to juicejacking, when all we want is an emergency phone charge.
L33tdawg: Slides and presentation materials can be found at http://conference.hitb.org/hitbsecconf2013ams/materials/
The organizers of the Hack in the Box conference have started publishing the complete videos of the presentations held at this year’s Amsterdam edition.
A lot of renowned experts have taken part this year, so if you weren’t able to make it in person, you can check out the official videos.