This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Which brings us back to Aadhaar and some rather unpleasant headlines of late, particularly the likes of The World's Largest Biometric ID System Keeps Getting Hacked. They claim that they're hack-proof. But claiming the service is "hack-proof", that's something I definitely have an issue with. Can you prove otherwise?
Maybe on hack-yourself-first.com 🤣 Clearly, I didn't forget and I also didn't forgive and he probably should have expected me (sorry, couldn't help myself!)
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
These were companies spanning all sorts of different industries; big tech, general infosec, antivirus, hosting, finance, e-commerce, cyber insurance - I could go on. The point is the net was cast very wide. We whittled the original 141 companies down to the 43 that were best aligned to the goals I outlined in the original blog post.
So yes, travel went up but I also did a bunch of remote workshops which helped keep that down, as well sending Scott Helme to run in-person ones that contributed to keeping me on Aussie soil. Flight wise, App in the Air captured things in a nice visual fashion: That's up 15,000km, 17 hours and 3 flights from last year.
PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. in InfoSec however, learning happens 365 days a year.
Besides the keynote sessions and interactive panels, you’ll have access to hands-on workshops and some very useful techniques and methods. Jasmine is an application security engineer, blogger, author, adjunct professor at Drexel, and 2020 Infosec Hall of Fame inductee. We assembled a lineup of experts who definitely “walk the walk”?
In July, the Federal Trade Commission hosted a workshop dubbed “ Nixing the Fix ” that delved into industry restrictions on repair. Then, in August, right to repair advocates (including yours truly) traveled to Las Vegas to speak as part of Ethics Village at the annual DEF CON hacking conference.
I’m not originally from the InfoSec world. But now I have also gone through SECOM’s Advanced Practical Social Engineering , Paul Ekman’s microexpression training , and trained with Joe Navarro at our Human Hacking Conference (HHC). Their workshops will enlighten you to the value of acting skills in communication.
In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. We did not want to step on any other projects toes in infosec realm, or even IT in general. How did you pick the name?
Hacking has an event that’s similar. It’s about challenging our expectations about people who hack for a living. It’s exciting because it best mirrors the world of pen testing and hacking on a red or blue team. And I like looked at it I was like, oh it's hacking stuff you know that sounds pretty cool.
government’s approach has historically been reactive, highlighted by the 2008 Russian hack against the Department of Defense using simple USB drives, which led to the creation of US Cyber Command. Vehicle hacking fascinates me due to its potential impacts. One key takeaway was that the U.S.
It’s always interesting for me to hear how different people are approaching the same problems in infosec. It’s about challenging our expectations about the people who hack for a living. They need input from vendors and users to build up a common database that in turn will be useful to the larger infosec community.
The FTC claims that spy phones secretly harvested and shared data on people's physical movements phone news online activities through a hidden hack. It's about challenging our expectations about the people who hack for a living. Vamosi: That talk focused on the fact that there are InfoSec hackers openly working to address this problem.
Can you hack an airplane? Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. So, given that we can now hack into cars remotely, could we hack into other systems as well?
Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking hacks. Then, a several years ago, I discovered a website that steps you through the process of hacking combination locks. To start, challenges, and workshop tables.
Ollam, who was an early member of Toool, The Open Organization of Lockpickers, discusses his career as a physical pen tester and also provides some basic lockpicking hacks. Then, a several years ago, I discovered a website that steps you through the process of hacking combination locks. To start, challenges, and workshop tables.
In this episode I’m talking to the organizers of the Lockpicking Village,the ICS village, the Car Hacking Village, and the Aerospace Village. And, there’s thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. I'm Robert Vamosi.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content