Remove 02
article thumbnail

Expectations and opportunities in using bank consumer personal data

CGI

Expectations and opportunities in using bank consumer personal data. Fri, 02/19/2016 - 01:49. A top business priority for banks today is to have a complete 360 degree view of customers through the collection and use of personal data. Some key survey findings on the use of customer data follow. kathy.jacquay@….

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

A week before the 2016 election, Laura was brought in on a 6-month detail to the Secretary of Commerce’s office to help with the presidential transition, focusing on website and social media. NARA’s policies are social media include: NARA Bulletin 2015-02: Guidance on managing electronic messages. Troubleshoot #1. Challenges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

*bleed continues: 18 byte file, $14k bounty, for leaking private Yahoo! Mail images

Scary Beasts Security

00 04 00 04: image dimensions 1024 x 1024 02: flags 0x02 (no background color) 01: 1 plane (i.e. This means that the process memory space of the exploited process is only likely to contain the attacker's image data, making exploitation much less interesting (but not irrelevant as we saw in my recent Box and DropBox blog posts).

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. Kurt Seifried : 02:41 Remember how excited we were for the DARPA autonomous vehicle challenges? Cyber Grand Challenge was held at DEFCON 2016, so we're in front of 30,000 people.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. Kurt Seifried : 02:41 Remember how excited we were for the DARPA autonomous vehicle challenges? Cyber Grand Challenge was held at DEFCON 2016, so we're in front of 30,000 people.

article thumbnail

OPEN SOURCE SECURITY PODCAST EP. 151-- THE DARPA CYBER GRAND CHALLENGE WITH DAVID BRUMLEY

ForAllSecure

David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. Kurt Seifried : 02:41 Remember how excited we were for the DARPA autonomous vehicle challenges? Cyber Grand Challenge was held at DEFCON 2016, so we're in front of 30,000 people.

article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

The Project Zero 90-day deadlines appear to achieve this compromise nicely and there’s a lot of data backing up the policy. In the NES application, the upper 32kB of address space (0x8000 - 0xffff) is reserved for ROM, i.e. the read-only data on the cartridge you have stuffed in. This 0day is more about fun than impact.