Remove tag do-not-call
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. US Army Video: Operations security or OpSec, preserves the effectiveness of military capabilities and keeps potential adversaries from discovering our critical information. Why glorify the criminal hackers?

Privacy 52
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. You know why it's called "Have I Been Pwned"? And every time I do a Google search for a major news outlet, I find this little website.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Become a sponsor Information Architecture for Audio: Doing It Right by Jens Jacobsen on 2008/09/12 | [7 Comments] Content today is increasingly delivered by audio both online and in the real world. when doing physical work, driving, walking, etc). In some cases, text is a better choice and in other cases it’s video.

article thumbnail

Locking Down Your Website Scripts with CSP, Hashes, Nonces and Report URI

Troy Hunt

As it turns out, breaking websites is a heap of fun (with the obvious caveats) and people really get into the exercises. For example, if we take the sample vulnerable site I use in the exercises and search for "foobar", we see the following: You can see the search term - the untrusted data - in the URL: [link].

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

They’re called Capture the Flag competitions. Okay, so how do you learn to think outside the box and become an elite hacker? Vamosi: So how do you become a legit elite hacker? I’m training and running the marathon to improve my health, to improve my own personal record. Hacking has an event that’s similar.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

All of these things combined – the prevalence of breaches, the analysis I was doing and the scale of Adobe – got me thinking: I wonder how many people know? Do they realise they were breached? Do they realise they were breached? Do they realise how many times they were breached? I have work to do, thank you guys.