Remove 2010 Remove Hacking Remove InfoSec
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Which brings us back to Aadhaar and some rather unpleasant headlines of late, particularly the likes of The World's Largest Biometric ID System Keeps Getting Hacked. They claim that they're hack-proof. But claiming the service is "hack-proof", that's something I definitely have an issue with. Can you prove otherwise?

Hacking 280
article thumbnail

Socks! Our cyber prediction for 2024

Pen Test Partners

But I felt somewhat vindicated when, after 40+ back to back live hacking demos at the Infosecurity Show, we had given away 1500 pairs of socks to ‘ah, I loved my Dr Solly’s socks’ and the like. Pen Test Partners PTP started in 2010. Back to the Infosec Show in 2011 and the ever-popular socks got another outing. Understandable!

InfoSec 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Apple Podcasts.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Apple Podcasts.

Hacking 52
article thumbnail

Malicious Life Podcast: The Jester – Hacktivist for Good

Security Boulevard

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester's operations were little more than internet sleight-of-hand. So, who is The Jester and what can we make of his reported exploits?

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Apple Podcasts.

Hacking 40
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

With the launch the first stable release of BackTrack 4 in January 2010, the project got its own domain ( backtrack-linux.org ) and moved off remote-exploit. As this was not a “Long-Term Support” (LTS) release, upstream would only support it until April 2010 - one year & six months. How did you pick the name?

InfoSec 52