Remove page d
article thumbnail

GeekWire Summit 2021 recap: Leaders and luminaries share insights at our annual conference

GeekWire

The GeekWire Summit returned to Seattle and took a page out of our shared reality, going hybrid this week with an in-person and virtual audience for two days of fireside chats, power talks and panel discussions centered around technology, innovation, science, civic issues and more. GeekWire Photos). It was really nice to be back.

article thumbnail

The anatomy of a Facebook account heist

Vox

It’s all about the easy money” “It’s all about the easy money,” Hieu Minh Ngo, a prolific ex-hacker turned cybersecurity researcher, told Vox. “A To gain a deeper understanding of what drives Facebook account theft, Vox spoke with nearly 100 victims from at least 14 countries as well as Facebook page administrators about the trend.

Groups 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security.

Study 40
article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Maybe if someone had told me to account for space wizards when designing the exhaust ports maybe we’d still have a Death Star. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. But in information security, it's not always true.