Jimmy is a good guy - I like him, he works in security and trains MMA. Which means if he can't gain access to your server, he'll simply beat the password out of you. Then he posted this picture on twitter in a cowboy hat. As they say, a little photoshop is a dangerous thing … Continue reading A friend with photoshop is all you need
Author: j4vv4d
RSA & BSides SF 2014
For the times you feel like the ball inside a pinball machine.
Here’s full disclosure – now no disclosure
Full disclosure has announced it's shutting down. Even people far more capable than me are trying to comprehend why. One of the key grievances cited by John as to why Full Disclosure is being shut down was the constant battling against trolls - even from within the security community. It raises a number of interesting … Continue reading Here’s full disclosure – now no disclosure
The Cyber Security Skills Gap
Monday morning and RSA 2014 has not even properly started but there I was up on stage in front of a rather packed room. Feeling jet-lagged and wishing I had more caffeine in my system, I was glad that I was simply moderating a panel which included Dwayne Melancon, Andy Ellis, Jane Lute and Mike … Continue reading The Cyber Security Skills Gap
Bug Bounty
A bug bounty is a reward handed out by companies to people who disclose bugs or vulnerabilities to them in a responsible manner. Think of it like the wild west where anyone is deputised with powers to chase after the Kid and claim the reward dead or alive. Traditionally companies like Google and Facebook offered … Continue reading Bug Bounty
Security Dialectic: Kaspersky Industry Analyst Summit
A tropical Island paradise, a Russian millionaire and hackers may sound like the plot of a James Bond movie, but they are actually references to Kaspersky’s industry analyst event in Punta Cana, Dominican Republic, where the company was expected to divulge its plans, aspirations and research to analysts from around the world. Four of 451 … Continue reading Security Dialectic: Kaspersky Industry Analyst Summit
Phishing prevention
The folks at Information Security Buzz were asking a bunch of people for their tips in how to avoid phishing scams. I responded in the form of a video.
Breaking news – Lemonade compromised
Lemonade is big business - lemonade made from natural ingredients even more so... but what happens when your lemonade isn't quite what you thought it was? We bring you this special report.
2013 roundup with friends
If 2013 was a movie... these are the end credits.
APT Predator
When I was an intern, we found a database. It looked like - like, butchered. The old mainframe women in the basement crossed themselves... and whispered crazy things, strange things. "El Diablo cazador de hombres." Only in the hottest years this happens. And this year the cooling system failed. We find data servers sometimes without … Continue reading APT Predator
