Remove tag hacker
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

Search for your account across multiple breaches [link] — Have I Been Pwned (@haveibeenpwned) December 4, 2013 And then, as they say, things kinda escalated quickly. And I never envisioned a time where dozens of national governments would be happy to talk about using the service. "Have I been pwned?"

article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each). Let me now take that one step further and talk about government.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

Music] Welcome to The Hacker Mind, an original podcast from ForAllSecure. And, and that did that for 13 years and because of my involvement in critical infrastructure, I was asked by the White House to assist in developing the NIST cybersecurity framework in 2013. I hope you stick around. Right, okay.

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

A 2020 study of pentesting projects from Positive Technologies revealed that external attackers could breach 93% of company networks , with 71% being vulnerable even to novice-level hackers. Finally, it could even act as a backdoor through which hackers could gain remote access to the infected machine’s resources.