
Sign up to save your podcasts
Or
This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
4.6
134134 ratings
This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
1,981 Listeners
364 Listeners
639 Listeners
370 Listeners
1,013 Listeners
314 Listeners
408 Listeners
7,921 Listeners
163 Listeners
190 Listeners
311 Listeners
76 Listeners
128 Listeners
43 Listeners
168 Listeners