Remove 10
Remove 2015 Remove Examples Remove Exercises Remove Information Security Remove Security
article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

So perhaps a better example is Zarata, who we met in EPISODE TWO. It bills itself as the most comprehensive student-run cyber security event in the world, featuring nine individual hacking competitions, including CTFs. So I originally had kind of participated in cyber stakes, way back in 2015. Cyber 600 and that was.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Mechanical things. Electronic Things. My process was crude.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Often I would just use a screwdriver and break a toaster, for example, down to its smallest components, and then try and map out its circuitry. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Mechanical things. Electronic Things. My process was crude.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. but the link to the privacy and security policies was dead.

Passwords 111