Remove tag twitter
article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

I want to talk about 3 upcoming events which Scott Helme and I are going to be running our Hack Yourself First workshop at starting with this one: NDC Security Australia, 26-27 March, AU$800 This is an extra special event that we've only just decided to run. The website is up and running and you can go and register right now.

Mining 102
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. In reaction to this in 2018 Aaron Z Lewis, a young designer, wrote in his Twitter feed, in light of the latest Facebook scandal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

So getting cybersecurity education materials often comes with a price tag. That's something that's a bit unique, there's typically a video game component with every competition. We'll be expanding on ways that we use the video game in the future, and the game was developed here at CMU at the Entertainment Technology Center.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

The video within that story reiterates over and over again that "Aadhaar data cannot be breached" It then goes on to quote the government as saying that: it cannot be questioned by a handful of individuals. to the enrolment centre is going to have traffic compromised before seeing the HSTS header if an MitM risk is indeed present.

Security 111
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. To be completely honest, it's been an enormously stressful year dealing with it all.

article thumbnail

The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries

Troy Hunt

This tag was in the source code over at secure.donaldjtrump.com/donate-homepage yet it was pulling script directly off Igor Escobar's GitHub repository for the project. I woke up on the other side of the world to most people this morning and my Twitters had gone nuts overnight with this story: Ummm, so yeah, this is *bad*. Until now.