Remove Conference Remove Encryption Remove Libraries Remove Mining
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Kent: it's a little bit of a borrowed term right inside of software there are API's that you call, you know, in the libraries and stuff to move things around, and we've moved it out into the application space as kind of a way to go get data, a way to communicate between two systems. Kent: I started calling friends of mine. He told me.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Kent: it's a little bit of a borrowed term right inside of software there are API's that you call, you know, in the libraries and stuff to move things around, and we've moved it out into the application space as kind of a way to go get data, a way to communicate between two systems. Kent: I started calling friends of mine. He told me.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Twitter Hacking for Profit and the LoLs

Krebs on Security

Known as “original gangster” or “OG” accounts, short-character profile names confer a measure of status and wealth in certain online communities, and such accounts can often fetch thousands of dollars when resold in the underground. “just dont want my irl getting sus[pended].”

Access 290
article thumbnail

2017 Retrospective

Troy Hunt

It was a massive year for encrypted web communications and people have really eaten up material on it. I have trips committed to in Europe in Jan, the US mainland in March and Hawaii in April (it's a conference, honest!) The "Hold My Beer" post was probably the most fun (or is that "frightening"?)

IT 47