Remove Course Remove Mining Remove Presentation Remove Video
article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

Of course it's virtual because let's face it, nobody is going anywhere at the moment. Or don't ask anything and we'll banter away as we normally would anyway which people always seem to love when it happens on my weekly videos. Questions can be asked on any topic anyone feels like and we'll both be there responding together.

Mining 101
article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

Related video: Why it’s high time to protect unstructured data. Typical unstructured data includes a long list of files—emails, Word docs, social media, text files, job applications, text messages, digital photos, audio and visual files, spreadsheets, presentations, digital surveillance, traffic and weather data, and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

The delivery of malicious code through advertising supply chains is an insidious attack spanning over the course of 15 years. Helping to fuel the change are consumers increasingly embracing social media and digital video. Spending on Digital Display Ads Increasing.

IoT 145
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Society begrudgingly accepted the transformative changes, yet the changes moved society forward. Introduction.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

And of course, we’re all fully staffed, right? We were proactive with offers to present on the program at any venue. Others, like brief and bang-bang, YouTube-style training videos, are planned. the many fronts that records touch within the organization make us feel like we need an army to even chip away at solutions.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers.

Passwords 220
article thumbnail

I Now Own the Coinhive Domain. Here's How I'm Fighting Cryptojacking and Doing Good Things with Content Security Policies.

Troy Hunt

Every site that had Coinhive running on it, either by the design of the site owner or at the whim of a cryptojacker, stopped mining Monero. which was used for their link shortener (which also caused browsers to mine Monero). The site disappeared and the domain stopped resolving. wasm) in their paper. Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+apollohobo/1.0.0+Chrome/58.0.3029.110+Electron/1.7.9+Safari/537.36

Security 145