Remove tag do-not-call
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

I've written extensively about how HIBP has grown over the years and doing so has been a cornerstone of the philosophy of how I've run the service - with maximum transparency. Just to scroll back for a bit of context, anyone who owns a domain can do a free domain search on HIBP. And then it took off.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. So I called up someone from pico CTF, to learn more.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. Apps that haven't yet been flagged as such, but do the same thing. It's natural.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Many people are doing that just now, including myself regarding that "hack-proof" claim.

Security 111
article thumbnail

Locking Down Your Website Scripts with CSP, Hashes, Nonces and Report URI

Troy Hunt

I run a workshop titled Hack Yourself First in which people usually responsible for building web apps get to try their hand at breaking them. That's pretty much XSS 101 - just get an alert box to fire - and reflecting a script tag is one of the most fundamental techniques attackers use to run their script on your website.