via IFTTT Read the original blog by Rowenna here: http://ift.tt/2zgNKou If PCI DSS paid off the mortgage, then GDPR looks well on its way to buy the yacht. But how does one go about making some of that GDPR gangster money if they don't know much about the regulation? Well, becoming a GDPR consultant is … Continue reading GDPR Millionaire
Author: j4vv4d
How to be an infosec thought leader
Becoming a thought leader is the epitome of professional success. But a thought leader isn't a title that one attains by going to Harvard, or Cambridge. No, it's a title bestowed by your peers. So how does one become known as a thought leader? Simple, just watch this video and follow the awesome advice given … Continue reading How to be an infosec thought leader
Bsides Lisbon and the car door
I’m truly honoured to have been invited to keynote at Bsides Lisbon this year on November 10th. It’ll be the first time I’ve visited Portugal, and the first time I’ve keynoted at a Bsides. Ordinarily I’d probably be feeling a bit apprehensive of speaking at a conference that I haven’t even attended, let alone keynote … Continue reading Bsides Lisbon and the car door
Undermining security and weakening Android
I have Amazon Prime, I quite like their shows, and whenever I have some time to kill I’ll watch an episode or 3. A couple of weeks ago, I thought it would be a good idea to install the official Amazon video app on my android device, so that I could download episodes and watch … Continue reading Undermining security and weakening Android
Ransomware uses
via IFTTT Someone asked me if there are any unusual or legitimate uses for ransomware. If you break down what ransomware is, it's just encryption. But it's more like "surprise" encryption where someone else does the encryption, and keeps the key. So, I present five unorthodox ways to use ransomware in this video. However, if … Continue reading Ransomware uses
New CEO leading the Bugcrowd
Bugcrowd has announced a new CEO, Ashish Gupta to take the helm from founder Casey Ellis, who has stepped aside to assume the role of Chairman and CTO of the firm he founded five years ago in 2012. The move shows a level of maturity on behalf of the company, and indeed Ellis. Startup founders … Continue reading New CEO leading the Bugcrowd
Hacking Conference Shirts
T-shirts are among the most popular giveaways at security conferences. They're great, practical, and serve as walking advertisements. But if you go to enough conferences, you'll usually find yourself accumulating far too many shirts. There are only so many shirts you can use to wear when working out, or doing DIY projects, or as rags … Continue reading Hacking Conference Shirts
Digital Cemetery and the Myspace vulnerability
via IFTTT Recently, security researcher Leigh-Anne Galloway (@L_AGalloway) found a vulnerability on Myspace, my first thought was amazement that Myspace still existed. It’s one of the sites that seems to have been lost in the digital abyss, like tears in the rain. The details of the vulnerability (which appears to have been fixed now) can … Continue reading Digital Cemetery and the Myspace vulnerability
BBC Click and Tweetchats
Spent a day with the BBC, and hosted a tweetchat. Just an ordinary day, no biggie.Link to the tweetchat moment: https://twitter.com/i/moments/885498294339858433 Tweetchat blog isn't about, but keep your eye on http://ift.tt/1s8wHrF for info
RANT, Steelcon, and that shirt!
One man, two conferences, three days. The conferences http://ift.tt/29JwqL2 http://ift.tt/2uc7aIJ My band, Host Unknown hostunknown.tv
