Remove 2016 Remove DNS Remove InfoSec
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

I've implemented CAA on HIBP and it's simply a matter of some DNS records and a check with a CAA validator : Unfortunately, there are no such records for Aadhaar: Now in fairness to Aadhaar, CAA is very new and the take-up is low ; we cannot be critical of them for not having implemented it yet. Blocking Paste.

Hacking 279
article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

We can't touch DNS. " Thing is, "control" is a bit of a nuanced term; there are many people in roles where they don't have access to any of the above means of verification but they're legitimately responsible for infosec and responding to precisely the sorts of notifications HIBP sends out after a breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? In 2016, Professor Brumley and a team of students from CMU were victorious in DARPA's first ever Cyber Grand Challenge that pitted automated cyber defense technologies against one another.

InfoSec 52
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? In 2016, Professor Brumley and a team of students from CMU were victorious in DARPA's first ever Cyber Grand Challenge that pitted automated cyber defense technologies against one another.

InfoSec 40
article thumbnail

SECURITY LEDGER PODCAST: SECURITY AUTOMATION IS (AND ISN'T) THE FUTURE OF INFOSEC

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? In 2016, Professor Brumley and a team of students from CMU were victorious in DARPA's first ever Cyber Grand Challenge that pitted automated cyber defense technologies against one another.

InfoSec 40
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Perhaps even more significant was in 2008 when researcher Dan Kaminsky found a fundamental flaw in the Domain Name System (DNS) protocol, one that could lead to cache poisoning. In September 2016, Microsoft announced Project Springfield, a cloud-based fuzz testing service for finding security critical bugs in software.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Perhaps even more significant was in 2008 when researcher Dan Kaminsky found a fundamental flaw in the Domain Name System (DNS) protocol, one that could lead to cache poisoning. In September 2016, Microsoft announced Project Springfield, a cloud-based fuzz testing service for finding security critical bugs in software.