I haven’t really done a technical walkthrough type video and I now remember why I never did. These things are hard to do and involve two of my least favourite elements of video-making, screen captures and voiceovers. Which is why I always tip my hat to Vivek and his great tutorials over at SecurityTube.net The … Continue reading Cracking wifi passwords with Kali Linux
Category: Video
(ISC)2 Congress 2014
This years (ISC)2 congress was held in Atlanta, GA. I’d heard of Atlanta being referred to as ‘Hotlanta’ and was warned of the humidity that prevails, but fortunately I caught it at the right time of year where the weather was quite pleasant. The conference itself appears to have grown over the last two years … Continue reading (ISC)2 Congress 2014
Photos in the cloud
We put 'stuff' in the cloud all the time - and most of the time, that's perfectly fine because there aren't any state secrets or self-incriminating evidence contained. The convenience factor it offers typically outweighs the risks. Having said that, it's always worthwhile evaluating the risks - in particular when using photo backups from your … Continue reading Photos in the cloud
Interview with the BatCISO
With so many breaches occurring on a regular basis, perhaps it's time for a new kind of CISO. A Bat CISO!
Security and the cobra effect
Some people just want to watch the world burn. Others just want to give bad security advice. Check out Troy Hunt's blog post on the matter.
Spotting phishing scam emails
Phishing emails can be nasty pieces of work. They put a lot of effort into appearing legitimate in order to trick users into falling for their scams. In this video, I only take a look at this one specific email which claimed to come from Apple. There are lots of signs to look out for … Continue reading Spotting phishing scam emails
RSA & BSides SF 2014
For the times you feel like the ball inside a pinball machine.
Bug Bounty
A bug bounty is a reward handed out by companies to people who disclose bugs or vulnerabilities to them in a responsible manner. Think of it like the wild west where anyone is deputised with powers to chase after the Kid and claim the reward dead or alive. Traditionally companies like Google and Facebook offered … Continue reading Bug Bounty
Security Dialectic: Kaspersky Industry Analyst Summit
A tropical Island paradise, a Russian millionaire and hackers may sound like the plot of a James Bond movie, but they are actually references to Kaspersky’s industry analyst event in Punta Cana, Dominican Republic, where the company was expected to divulge its plans, aspirations and research to analysts from around the world. Four of 451 … Continue reading Security Dialectic: Kaspersky Industry Analyst Summit
Phishing prevention
The folks at Information Security Buzz were asking a bunch of people for their tips in how to avoid phishing scams. I responded in the form of a video.
