Remove tag do-not-call
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

I've written extensively about how HIBP has grown over the years and doing so has been a cornerstone of the philosophy of how I've run the service - with maximum transparency. Just to scroll back for a bit of context, anyone who owns a domain can do a free domain search on HIBP.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that. What organization wouldn't call her, at least for an interview. Tennisha: In my mind I'm saying, why aren't they calling me back right. Apparently plenty.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

million InfoSec professionals, as of early 2021 How can that be part of the problem lies in the training pipeline, we really have to do a much better job with that. What organization wouldn't call her, at least for an interview. Tennisha: In my mind I'm saying, why aren't they calling me back right. Apparently plenty.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

So I called up someone from pico CTF, to learn more. Kearns: My name is Megan Kearns and I am the project manager for picoCTF, it's developed in CMU, out of the CyLab security and privacy Institute and I've been with CMU for 10 years, and I worked in silos, for all of those 10 years, doing different things.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc.

article thumbnail

Locking Down Your Website Scripts with CSP, Hashes, Nonces and Report URI

Troy Hunt

I run a workshop titled Hack Yourself First in which people usually responsible for building web apps get to try their hand at breaking them. That's pretty much XSS 101 - just get an alert box to fire - and reflecting a script tag is one of the most fundamental techniques attackers use to run their script on your website.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Many people are doing that just now, including myself regarding that "hack-proof" claim.

Security 111