Remove Examples Remove Exercises Remove Information Security Remove Mining
article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And the rest, they say is this as a reporter, I was in a position to learn as I wrote about information security. Vamosi: Welcome to the hacker mind that original podcast from for all secure. I would say primarily two and a half years and I still don't do exercises that well because I never look for exercise.

Mining 40
article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

"As security controls and cyber defense techniques increasingly focus on detecting and mitigating email-based phishing risks, threat actors have devised new attack vectors to target mobile devices," the researchers state. These new attack vectors aim to exploit instant messaging apps, SMS, and even fake QR codes. Thanks for your email.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Here’s a really common example. I started in journalism. Vamosi: Two things here.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Here’s a really common example. I started in journalism. Vamosi: Two things here.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. Here’s a really common example. I started in journalism. Vamosi: Two things here.

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

Particularly when we're talking about public figures in positions of influence, we need to see leadership around infosec, not acknowledgement that elected representatives are consciously exercising poor password hygiene. The most impactful example of this is Edward Snowden persuading NSA colleagues to provide their credentials to him.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Mine was 2000. Daniel provides an example. Daniel’s first Black HAt was in 1999.

IT 40