Remove 11
Remove 2019 Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

Weekly Update 134

Troy Hunt

. — Troy Hunt (@troyhunt) April 11, 2019. I also go on a bit of a rant about devices and services targeted at monitoring kids and as I say in the video, you'll see precisely why this is such a big issue for me probably next week or the week after.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

While most issues can be fixed through prompt patching and updating, a few remain unfixed and may require more significant changes to the security stack to block possible attacks. March 22, 2024 Emergency Out-of-Band Windows Server Security Updates Type of vulnerability (or attack): Memory leak. out of 10), and calls it Shadow Ray.

Libraries 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

One of those interests that took off was computer security. Some hackers live stream events. But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. And this was until then I stumbled over GeoHot doing the live CTF videos where I saw a professional just hack away in the terminal. MODEM SOUND].

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

One of those interests that took off was computer security. Some hackers live stream events. But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. And this was until then I stumbled over GeoHot doing the live CTF videos where I saw a professional just hack away in the terminal. MODEM SOUND].

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. How then will we secure adequacy without adhering to the charter? I think we can all say “Hear, hear” to that.

GDPR 120
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

After 11 months of a very intensive process culminating in many months of exclusivity with a party I believed would ultimately be the purchaser of the service, unexpected changes to their business model made the deal infeasible. of the company.

IT 133