Remove the-effectiveness-of-publicly-shaming-bad-security
article thumbnail

The Effectiveness of Publicly Shaming Bad Security

Troy Hunt

Here's how it normally plays out: It all begins when a company pops up online and makes some sort of ludicrous statement related to their security posture, often as part of a discussion on a public social media platform such as Twitter. Shame, those opposed to it will say, is not the way. See the theme? So I wrote a blog post.

Security 104
article thumbnail

No, Spotify Wasn't Hacked

Troy Hunt

The attack is simple but effective due to the prevalence of password reuse. When an HIBP subscriber's address appears in one of these incidents, they get an automated notification and often, it seems, they then reach out to me. Clearly a Spotify breach, right? No, and the passwords are the very first thing that starts to give it all away.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. New technologies have started innumerable economic revolutions, and the pace of change continues to accelerate. Data is not just a resource for better marketing, better service and delivery.

GDPR 120
article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

Using ASAN as a protection

Scary Beasts Security

It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. But the slow down is not so bad that a particularly paranoid user wouldn't be able to easily accept it on a fast machine. It is primarily a detection tool. These bugs can be extremely powerful.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.