Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

You Gotta Hack That Podcasts

show episodes
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Loading …
show series
 
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
  continue reading
 
In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
  continue reading
 
Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present. Email Felix using [email protected] Find You Gotta H…
  continue reading
 
Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different…
  continue reading
 
Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensur…
  continue reading
 
Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible. Email Felix using [email protected] Find You G…
  continue reading
 
Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
  continue reading
 
Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
  continue reading
 
It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity. We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus. We discuss how ModBus might be attacked, especially when thinking about all the other technologies that…
  continue reading
 
Felix opens two smart plugs and discusses the security of what he finds. This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottaha…
  continue reading
 
Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems. The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack you…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play