Remove Books Remove Hardware Remove Information Security Remove Windows
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

” That warning, so obvious today, was a blunt wake-up call 20 years ago for many of the software developers reading the book Writing Secure Code, by Microsoft security engineering leaders Michael Howard and David LeBlanc. And the security of Microsoft’s software is still falling well short of Gates’ vision.

Microsoft 104
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Last year at Hacker Summer Camp I was invited to Mikko Hypponen’s book launch for If it’s Smart, It’s vulnerable. Anyway, one year there was this weird hybrid of hardware and software challenge. So it's kind of in between the sort of software and hardware hardware if you listeners aren't familiar with it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? And in this episode, I'm going to be discussing the world of reverse engineering hardware. Hard and hardware hack with no hardware.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. valid points.

System 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. I write a monthly security column for Windows Secrets and I do a couple other things on the side. I've also written the book which I'll get to in a moment. This is a bytes and bullets. DEF CON at 30 is massive.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

Mikko Hypponen joins The Hacker Mind to discuss cybercrime unicorns, the fog of cyber war that surrounds the Ukrainian war with its much larger neighbor, and of course Mikko’s new book, If it’s Smart, it’s Vulnerable. Vamosi: The slogan of the RSA Conference is “Where the World Talks Security,” and, in general.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

So he invites me to go to a book that, you know, one of those first black hats and Doug Song was set doing his thing on checkpoint firewall bypass, and I'm sitting there, and a guy named Jeff Nathan. CLEMENS: And basically, they just gave me you remember, back in Windows, they had the index dot dat files that had some history in it.