article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. He retired as a colonel in 2010. In government, Brooks served under President George W.

article thumbnail

Remote sex toys might spice up your love life – but crooks could also get a kick out of them?

Security Affairs

Remote-control sex toys have been around since 2010. Most of the Lovense front-end website for controlling a remote device is built on cheap and rather old technology, dating back to around 2016. However, the company dismissed concerns that this outdated technology could prove vulnerable to cyber attacks. Lack of obfuscation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why are you ignoring NIST, NSA and the NCSC?

IT Security Guru

Between August 2020 and February 2021, “the agencies”, National Institute of Standards and Technology (NIST), National Security Agency (NSA) and National Cyber Security Centre (NCSC) had all published final or preliminary (beta) guidance for Zero Trust (ZT) that is applicable to all sizes of organisations.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

With the launch the first stable release of BackTrack 4 in January 2010, the project got its own domain ( backtrack-linux.org ) and moved off remote-exploit. As this was not a “Long-Term Support” (LTS) release, upstream would only support it until April 2010 - one year & six months. How did you pick the name?

InfoSec 52
article thumbnail

The weirdest security stories of 2022

Malwarebytes

To be more precise, 2010, 2016, and now 2022 with a whole new astronaut to recover. Amazon decided to trial ad technology which displays ads in Twitch streams, but the ads are only visible to certain people. So yes, it’s weird…but it’s just a one off. If you’re the player, you won’t see them.

Scams 76
article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? I'm attending in person this year, as are a lot of people in the InfoSec world. Rather, I choose to see this as a fresh start to create a new community within InfoSec. Jack Daniel offers his unique voice.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. held a pilot of a new Internet voting system.

Hacking 52