Weekly Update 465
How much tech stuff do I have sitting there in progress, literally just within arm’s reach? I kick off this week’s video going through it, and it’s kinda nuts. Doing runeos and house build doesn’t help, but it means there’s
Collaborate Disseminate
How much tech stuff do I have sitting there in progress, literally just within arm’s reach? I kick off this week’s video going through it, and it’s kinda nuts. Doing runeos and house build doesn’t help, but it means there’s
Spoiler: I have data from the story in the title of this post, it’s mostly what I expected it to be, I’ve just added it to HIBP where I’ve called it “Data Troll”, and I’m going to give everyone a
Continue reading That 16 Billion Password Story (AKA “Data Troll”)
We were recently travelling to faraway lands, doing meet and greets with gov partners, when one of them posed an interesting idea:
What if people from our part of the world could see a link through to our local resource on data breaches provided by the gov?
Initially, I was
Continue reading Get Pwned, Get Local Advice From a Trusted Gov Source
I think the most amusing comment I had during this live stream was one to the effect of expecting me to have all my tech things neat and ordered. As I look around me now, there are Shellys with cables hanging off them all over my desk, the keyboard I&
I’m often asked if cyber criminals are getting better at impersonating legitimate organisations in order to sneak their phishing attacks through. Yes, they absolutely are, but I also argue that the inverse is true too: legitimate organisations frequently communicate in ways that are indistinguishable from a phishing attack!
Continue reading Welcoming Guardio to Have I Been Pwned’s Partner Program
I’ve listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack of discussion around the privacy implications of the service before the breach. Here was a tool where people were non-consensually uploading photos of others
This will be the title of the blog post: “Court Injunctions are the Thoughts and Prayers of Data Breach Response”. It’s got a nice ring to it, and it resonates so much with the response to other disasters where the term is offered as a platitude
I often wonder how much people in other professions genuinely love the industry they’re in to the point that they’d do it regardless of the money. I’m sure there are examples, but I wonder how many lawyers look forward to doing something in the
Continue reading 11 Years of Microsoft Regional Director and 15 Years of MVP
If I’m honest, I was never that keen on a merch store for Have I Been Pwned. It doesn’t make the code run faster, nor does it load any more data breaches or add any useful features to the service whatsoever. But… people were keen. They
The Stripe situation is frustrating: by mandating an email address on all invoices, we’re providing a channel that sends customer queries directly through to us rather than via our support portal, which already has the answers many people are raising tickets for. It’s frustrating because it