Remove 2004 Remove InfoSec Remove Technology
article thumbnail

Introducing Behavioral Information Security

The Falcon's View

For those unfamiliar with Fogg's work, he started out doing research on Persuasive Technology back in the 90s, which has become the basis for most modern uses of technology to influence people (for example, use of Facebook user data to influence the 2016 US Presidential Election). release, expected sometime soon).

article thumbnail

The weirdest security stories of 2022

Malwarebytes

Way back in 2004, a spam email claimed that assistance was needed for a lost astronaut. Amazon decided to trial ad technology which displays ads in Twitch streams, but the ads are only visible to certain people. There’s not many individual scams which can put “18 years and counting” on their resume.

Scams 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. But what if the first successful attack on the grid didn’t happen in March 2019, but 15 years ago, in 2004?

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Quick history lesson It all began in 2004, with Whoppix , a security operating system based on Knoppix. Longer history lesson Knoppix - Initial two weeks work Whoppix (White-Hat and knOPPIX) came about as the founder, @Muts, was doing an in-person air-gap network penetration test lasting for two weeks in 2004.

InfoSec 52
article thumbnail

Security Roundup January 2024

BH Consulting

Since our inception in 2004, we have been committed to delivering cutting-edge so services, staying ahead of the ever-evolving landscape of cyber security and data protection whilst always safeguarding the digital assets of our clients. Over the past two decades, we have witnessed unprecedented changes in technology.

article thumbnail

Remote sex toys might spice up your love life – but crooks could also get a kick out of them?

Security Affairs

Most of the Lovense front-end website for controlling a remote device is built on cheap and rather old technology, dating back to around 2016. However, the company dismissed concerns that this outdated technology could prove vulnerable to cyber attacks. Lack of obfuscation. Is it really safe to use Bluetooth-controlled sex toys?