Remove tag do-not-call
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. You know why it's called "Have I Been Pwned"? And somehow, this little project is now referenced in the definition of the name it emerged from.

article thumbnail

Dear Facebook…Please Give Me Agency Over The Feed

John Battelle's Searchblog

But the same problems I’ve always had with Facebook are apparent here — some people I’m actually friends with, others I know, but not well enough to call true “friends.” But, if you want to follow what I’m up to — mostly stuff I write or stuff we post on NewCo Shift , well, it’s probably a pretty decent way to do that. And guess what?

IT 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

Over the years, Dan continued to do really great things. Like he created an app for people with color blindness called the DanKam. He called it Time Stone. So what do we mean by managing all the hardware? On a chip, there’s what’s called real-time operating systems or RTOS that executes commands.

article thumbnail

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

The single most important industry event I have yet attended; densely packed with immediately useable approaches, methodologies and best practices; staffed by passionate and supremely experienced SMEs – both within and extraneous to the discipline – providing a 360-degree view of the imminent CIGO revolution; overall a grand slam.

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Hacking has an event that’s similar. They’re called Capture the Flag competitions. Okay, so how do you learn to think outside the box and become an elite hacker? Vamosi: So how do you become a legit elite hacker? These computers capture the flag events which are loosely based on the children’s game.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. And yet, everything we do requires electricity, either AC through the wire or DC in the form of a battery when it's gone. And it's all about the hacker mindset.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111