Grand Idea Studio

Security

Perspectives from the L0pht

Thursday, May 20th, 2010

For nearly a decade, Joe Grand of Grand Idea Studio was a member of the infamous hacker collective known as L0pht Heavy Industries in Boston, Massachusetts. Starting in the early 1990s as a clubhouse for local hackers to store computer equipment, tinker with projects, and just hang out, the L0pht (spelled ell-zero-ph-t) ended up as seven close-knit friends changing the face of computer security vulnerability research and disclosure. [ continue ]

Hacks and Attacks: Examples of Electronic Device Compromise

Wednesday, May 19th, 2010

As engineers, we have a responsibility to learn from problems of the past in order to better equip ourselves for designs of the future. This session presents the typical hardware hacking process and some high-profile attacks against electronic devices such as microprocessors, smartcards, and parking meters. [ continue ]

Hardware is the New Software

Sunday, Oct 11th, 2009

Society thrives on an ever increasing use of technology. Electronics are embedded into nearly everything we touch. Hardware products are being relied on for security-related applications and are inherently trusted, though many are completely susceptible to compromise with simple classes of attacks that have been known for decades. [ continue ]

Smart Parking Meters

Thursday, Jul 30th, 2009

Throughout the United States, cities are deploying “smart” electronic fare collection infrastructures. In 2003, San Francisco launched a $35 million pilot program to replace approximately 23,000 mechanical parking meters with electronic units that boasted tamper resistance, payment via smart card, auditing capabilities, and an estimated $30 million annually in fare collection revenue. Other major cities, including Atlanta, Boston, Chicago, Los Angeles, New York, Philadelphia, Portland, and San Diego, have made similar moves. [ continue ]

RFID Security

Tuesday, Sep 26th, 2006

This presentation details RFID (Radio Frequency Identification) technology and its overarching security vulnerabilities. It begins with an overview of RFID architecture, standards, and common uses and implementations. The rest of the presentation focuses on security risks and practical attacks used to compromise an RFID system. [ continue ]

Press

Hackaday

Joe [Kingpin] Grand Keynote And ...

Hamish & Andy

Episode 161

Business Insider

I'm a hacker who helps people ...