Remove Handbook Remove Linux Remove Mobile Remove Virtualization
article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

The point here is that we aren't used to thinking about our cars as computing devices, and yet they are if common thieves are using laptops and mobile devices to gain access to them. So we'll have a virtual CTF. Leale: I would also recommend the Car Hacker's Handbook , I always do, by Craig Smith.