Security, privacy experts weigh in on the ICE doxxing
In what appears to be the latest salvo in a new, wired form of protest, developer Sam Lavigne posted code that scrapes LinkedIn to find Immigration and Customs Enforcement employee accounts. His code, which basically a Python-based tool that scans LinkedIn for keywords, is gone from Github and Gitlab and Medium took down his original […] Continue reading Security, privacy experts weigh in on the ICE doxxing
The mind behind Ethereum, Vitalik Buterin, is matter-of-fact about the crypto. In short, he believes what interviewer Naval Ravikant called “brain virus” is the true future of security and economics and, with the right incentives, Ethereum can replace things like credit card networks and even gaming servers. Buterin separates the world into two kinds of people.…
Security company Armis has found a collection of eight exploits, collectively called Blueborne, that can allow an attacker access to your phone without touching it. The attack can allow access to both computers and phones as well as IoT devices. “Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth. These vulnerabilities are fully operational,…
At this point in the game there should be a single page on every corporate website, preferably accessible from its front page, that includes the name and all contact details for the Chief Security Officer, including the last four digits of her social security number. It should be her responsibility to ensure that no one uses this information for nefarious purposes in addition to her daily…
Construction – the actual process of putting brick on brick to build something – is still in the dark ages. While there is plenty of technology out there to help plan massive projects few people are thinking hard about what it takes to actually build. Luckily Bassem Hamdy is one the case. Hamdy works for Procore Technologies where he and his team build products to help…