Roundup for the week ending 6th May 2016. Remember Orange Tsai wrote about how he hacked Facebook as part of their Bug Bounty program and found evidence of another hacker. Violet Blue digs a bit deeper to see how far the rabbit hole goes. This looks so cool - Build a Raspberry Pi-Powered Linux Laptop … Continue reading Things I hearted last week
Author: j4vv4d
Hacker Party
Following yesterday's video, a couple of people asked whether the "Hacker Party" song was actually a full-length song. I can neither confirm nor deny that Host Unknown is working on a full music video for this. But here's the track extracted for those who asked - it's a rough sample, so nothing we'd use in … Continue reading Hacker Party
Don’t vote for me
With infosec around the corner, the European Security Blogger Awards is imminent. If you're a blogger, you're eligible to nominate your favourite security blogger, podcast, and corporate security blog here. If you're wondering what kind of people I'd want to see nominated, I'd say, Holly Graceful, Stuart Winter-Tear, Steve Lord's Raw Hex, Ryan Dewhurst, Robin … Continue reading Don’t vote for me
Doing all the things you want to do
Someone dropped me an email a couple of days ago asking how one can best balance out all the things they want to achieve and learn professionally with limited time. I think this is a deeper question than he may have realised. Because time is our most valuable commodity and you don't want to look … Continue reading Doing all the things you want to do
Things I hearted Last Week
Roundup for the week ending 29th April 2016. BAE systems published a write-up on the hack against the Bangladesh Bank SWIFT system. Hacked Firm Cares More About Its Users' Security Than Its Image. Could this become a thing? Grab a coffee and set aside a few minutes to read this. A Leak Wounded This Company. Fighting … Continue reading Things I hearted Last Week
Android Malware
We often hear of the latest and greatest malware that targets android phones. However, many can be avoided by following simple steps such as not rooting your device or downloading files from dodgy sources. Matt Roxburgh inspired this video with this tweet on a common way malware gets on android phone with this image. I felt … Continue reading Android Malware
Heading to the Rocky Mountains
One of the best kept secret conferences over the last decade has been the Rocky Mountain Information Security Conference (RMISC). At least, I assume it's been a secret because I wasn't aware of it earlier. The reason I'm so interested in the Rocky Mountain Information Security Conference is that this year they kindly invited me … Continue reading Heading to the Rocky Mountains
Thycotic expanding its horizons
Washington DC-based password management vendor Thycotic was founded in 1996 making it one of the early entrants into the privilege password management space. While remaining largely self-funded since its founding, Thycotic recently took its first ever investment from Insight Venture Partners. The details of the deal remain undisclosed. Secret Server 9.0 – adding Mac and … Continue reading Thycotic expanding its horizons
Defining Threat Intelligence
In my younger days, I’d enjoy reading many books. I went through a phase where I really enjoyed Stephen King stories. One of my favourites being ‘Christine’, the story of a car that was possessed by a demon or something. I’d often come across new words that I didn’t understand. And being before the days … Continue reading Defining Threat Intelligence
Things I hearted last week
Nice short writeup of a BGP hijack event that took place. Steve Ragan at CSO Online has written about why the Hacking Team postmortem is something all security leaders should read. How I hacked Facebook, and found someone's backdoor script. Writeups like these really show the benefit of bug bounty programs. Of course Congress is clueless … Continue reading Things I hearted last week
