Remove Authentication Remove Automotive Remove Mobile Remove Network
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. Now, consider that your mobile probably has less overall memory than say your laptop. So how hard is it to hack APIs? Not very hard.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. Now, consider that your mobile probably has less overall memory than say your laptop. So how hard is it to hack APIs? Not very hard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. So, it has access really unfettered access to everything on the network.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. So, it has access really unfettered access to everything on the network.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

That’s perhaps because of a dedicated group of hackers who are working to improve automotive security. The point here is that we aren't used to thinking about our cars as computing devices, and yet they are if common thieves are using laptops and mobile devices to gain access to them. And in a moment you'll hear from one.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

Think of a mobile phone with just an on and off switch. If there were no volume control all the mobile phones today would ring at the same tone at the same decimal level. Yet by integrating granular controls such as volume, we've just made the mobile phone a lot more complex. That's how long I need. To take it.

System 40
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

As with most advances in automotive, this technology started at the higher end models. As Kevin Mahaffey of lookout said, Tesla is just a big network server on wheels. And at the time, while you couldn't necessarily start the car, you still needed the fob to present when you hit the start button. So the car would start.

Course 52