August 30, 2012March 14, 2023Computer, News, Privacy, Technology Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and “secure” credit cards, Hacker extraordinaire shows how nearly every secure system is vulnerable.