This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.
Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast.
begging questions about which infosec-related matters are particularly important, and how they stack up in relation to other business priorities, issues, pressures etc. In addition to the technical and human aspects of infosec, there are broader governance, strategic and commercial implications of [information] risk management and assurance.
And that's the problem: a data breach circulating broadly on a popular clear web hacking forum doesn't mean the incident is known by the corporate victim. Blame was laid firstly at those who obtained the data, then at me for my reporting of the incident (my own disclosure was absolutely "by the book").
Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. 45% of breaches involved Hacking. Hacking, social, and malware have fallen the most. Hacking types and vectors. Within hacking, web applications accounted for over 95% of breaches.
Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. It’s about challenging our expectations about the people who hack for a living. That is, until Chenxi Wang spoke up.
Is hacking a crime? Bryan McAninch (Aph3x) talks about his organization, Hacking Is Not A Crime , and the ethical line it draws on various hacking activities. I used to hack the phone company quite a bit. The 33 year old from suffer faced charges from US prosecutors as hacking into computers at various American agencies.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
It's been resoundingly well-received by both browsers to the site and the sponsors themselves and I've already booked 2019 out until August. MVP Summit in Seattle: This is my first time hearing @troyhunt speak, he is giving a talk called {Hack Your Career}, and this is great info and extremely well delivered.
In the book The Art of Invisibility , I challenged my co author Kevin Mitnick to document the steps needed to become invisible online. I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. Vamosi: Within InfoSec there's an informal use of AppSec as well.
I’m not originally from the InfoSec world. But now I have also gone through SECOM’s Advanced Practical Social Engineering , Paul Ekman’s microexpression training , and trained with Joe Navarro at our Human Hacking Conference (HHC). Our readers often ask whether acting skills and classes would benefit their social engineering career.
The states of Nevada, Minnesota and Washington stand out for having their own laws on the books creating liability in certain situations for businesses that handle credit card transactions and are not in compliance with PCI-DSS. States also differ on other data privacy and IT security compliance laws. Compliance Comes Down to Risk Management.
He recognized my passion for infosec (it wasn’t called cyber back then) and provided me with the support needed to make my ideas and projects a reality. Thanks to him I was able to co-found one of the first infosec consulting businesses in Spain in 2000, and I’m still very grateful for that opportunity. Great book by the way!).
In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. Although I was ahead of the times then, I believe leaders now must prioritise the mental health and wellbeing of themselves and their teams. It poses a threat in numerous ways.
Twitter infosec is the top 10%, at best, arguing with each other. I had a crazy idea this morning that I don't actually believe, but thought would be a great book idea. What if all this local municipality hacking and ransomware was part of a government resilience exercise? Probably also zero. Don’t want to patch?
A pledge to prevent harassment of infosec professionals. MORE Educational videos that teach how to hack? Here’s the security book. We also cover this attack vector in our comprehensive white paper on ransomware. More information about the campaign is at Respectinsecurity.org. Links we liked. You won’t find them on TikTok.
Students are provided with a lengthy PDF book and associated video tutorials with exercises to get them started. I already worked in infosec, and had a strong interest in the offensive security side. It’s self-paced with additional lab time easily added if you need more time. So how did I get there?
Bonus: 500 attendees will receive a copy of the book Aaron co-authored with Kelly Shortridge. Jasmine is an application security engineer, blogger, author, adjunct professor at Drexel, and 2020 Infosec Hall of Fame inductee. Aaron’s LinkedIn photo illustrates chaos engineering in action. Abhishek Arya, Google?—? you guessed it?—?open
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
Using his amazing hacking skills and unique tools he’d built over the years, Joe was able to extract the password from the chip, and Dan was able to retrieve his cryptocurrency. All of which speaks to the power of hacking. It's about challenging our expectations about the people who hack for a living.
Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more.
It’s about challenging our expectations about people who hack for a living. Raymond, from his 1999 book The Cathedral and the Bazaar. it was a multiple directory traversal vulnerability within GNU C Library that allows attackers to hack into git servers provided they were able to upload files there.
It’s about challenging our expectations about people who hack for a living. Raymond, from his 1999 book The Cathedral and the Bazaar. it was a multiple directory traversal vulnerability within GNU C Library that allows attackers to hack into git servers provided they were able to upload files there.
It’s about challenging our expectations about people who hack for a living. Well, why hack your way through a complicated backdoor method when you can waltz right in the front door as a fully credentialed user and then escalate individual privileges from the inside. And that's just because it's not in the books VAMOSI: True.
He’s played in ten final DEF CON CTFs, was a part of DARPA’s Cyber Grand Challenge, and recently he’s moderated the live broadcast of the annual Hack-A-Sat competition. Last year at Hacker Summer Camp I was invited to Mikko Hypponen’s book launch for If it’s Smart, It’s vulnerable.
Basically every corporation in the world has been publicly hacked, and it’s to the point now where nobody even cares when they hear about another one. In the case of corporate infosec that’s the business, and in the consumer world it’s the business of human thriving. —. And that brings me back to the Zoom thing.
Your data is viewed as a valuable commodity that many social media platforms have monetised without sufficiently informed consent and a bunch of online services then also get themselves hacked. Plus, she's both a teacher and a mother of kids a similar age to mine so her opinion holds a lot of weight in my book.
This is a story about a massive corpus of data circulating widely within the hacking community and misattributed to a legitimate organisation. That's a particularly sore point for me right now because of this incident just last week: This is the dumbest infosec story I’ve read in… forever? Welcome to my world.
His book, Hacking Google was a best seller, but after, he just wasn't feeling it. Vamosi: Burnout is a major concern in the InfoSec world. Welcome to the hacker mind in original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. Here's his talk from DEF CON 17.
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold. Vamosi: Yeah.
In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold. Vamosi: Yeah.
It’s about challenging our expectations about the people who hack for a living. He’s been around the hacking scene since the late 1990s, he knows a few people, and he has contributed a lot to the industry. He started hacking in the 1990s. VAMOSI: In infosec we talk a lot about OpSec, good and bad.
In this episode I’m talking to the organizers of the Lockpicking Village,the ICS village, the Car Hacking Village, and the Aerospace Village. And, there’s thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. I'm Robert Vamosi.
In this week's episode of the podcast: Joseph Menn's new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World hit store shelves this week. That scoop helped propel Menn’s book to become a top selling cyber security book on Amazon even before it was released. We're joined.
This means a threat actor could read, modify and copy users’ address books and calendars without leaving any trace. What is more, in 2017, Italian infosec researcher Giovanni Mellini revealed in a blog post that he had successfully hacked a Lovense butt plug sex toy using a Bluetooth Low Energy (BLE) scanner. Pierluigi Paganini.
As an infosec leader, Vaughn witnessed first-hand the dearth of available IT talent that’s available to hire. He went “from a gang and getting in trouble all the way to the boardrooms in corporate America,” designing cyber programs for the U.S. NPower trains 1,200 students annually, 40 percent of them women of color. and Canada.
Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks. In fact, the word “hack” simply means to take things apart. It’s about challenging out expectations about the people who hack for a living. I’m waiting.
Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking hacks. Then, a several years ago, I discovered a website that steps you through the process of hacking combination locks. In fact, I keep a bag of them.
Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking hacks. Then, a several years ago, I discovered a website that steps you through the process of hacking combination locks. In fact, I keep a bag of them.
Like any other criminal hack. It’s about challenging our expectations about the people who hack for a living. Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. The hack was on that pipeline. Welcome to The Hacker Mind, an original podcast from ForAllSecure.
government’s approach has historically been reactive, highlighted by the 2008 Russian hack against the Department of Defense using simple USB drives, which led to the creation of US Cyber Command. Vehicle hacking fascinates me due to its potential impacts. One key takeaway was that the U.S.
Should infosec now be considered vocational training just like becoming an electrician or a plumber? How else should we address the skills gap in infosec? My boss at the time didn't know much about infosec. She died a few years ago, but I believe the book continues with other authors. I was a paid writer--whoo, whoo.
There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. It’s about challenging our expectations about the people who hack for a living. RSAC also attracts some of the top researchers in infosec.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content