Remove Hacking Remove InfoSec Remove Internet Remove Workshop
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Can you hack an airplane? Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. So, given that we can now hack into cars remotely, could we hack into other systems as well?

Hacking 52
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. in InfoSec however, learning happens 365 days a year.

Hacking 52
article thumbnail

Secure Software Summit 2022

Security Boulevard

Besides the keynote sessions and interactive panels, you’ll have access to hands-on workshops and some very useful techniques and methods. of code on the Internet is open source, so how do we find the hidden threats in open source projects?—?before will run a hands-on workshop on Analyzing Source Code for Vulnerabilities.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Domain The team knew how much BackTrack was growing in popularity, and as they did not switch the project name when using Ubuntu, it was time to create its own place on the Internet. In information security (infosec) there is the need to be on the latest version. At times, they would break their setup in the process.

InfoSec 52
article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Hacking has an event that’s similar. It’s about challenging our expectations about people who hack for a living. It’s exciting because it best mirrors the world of pen testing and hacking on a red or blue team. And I like looked at it I was like, oh it's hacking stuff you know that sounds pretty cool.

Hacking 40