Remove Education Remove Examples Remove Exercises Remove Mining
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. Back in September, a number of people pointed me at Experian's "FREE Dark Web Email Scan" (capitalisation is theirs, not mine) because on the surface of it, it seemed similar to my Have I Been Pwned (HIBP) service.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

For example, due to its convenience, ubiquity, and frequency of use, SMS is a rapidly growing attack vector for today's threat actors who are targeting mobile devices (via phishing or smishing) through the SMS protocol. reports. "As These new attack vectors aim to exploit instant messaging apps, SMS, and even fake QR codes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

I read this while wandering around in LA on my way home from sitting in front of US Congress and explaining security principles to a government so it felt like a timely opportunity to share my own view on the matter: This illustrates a fundamental lack of privacy and security education. link] — Troy Hunt (@troyhunt) December 2, 2017.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Mine was 2000. Daniel provides an example. Daniel’s first Black HAt was in 1999.

IT 40
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. You don't want to give them the hardest exercise or the heaviest weights that will discourage them. One time he’s successful.

IT 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. You don't want to give them the hardest exercise or the heaviest weights that will discourage them. One time he’s successful.

IT 52
article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. Immunisation.

Privacy 141