Security hacker

Results: 424



#Item
1Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
2

Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:27
    3

    ACSC Community Newsletter February 2017 I have argued in the past that one of the biggest challenges that the security community has to overcome is regaining the connection with our inner hacker. Before we began professi

    Add to Reading List

    Source URL: www.acscenter.org

    Language: English - Date: 2018-03-28 09:43:56
      4

      Hacker Curriculum  Adam Cecche0  Leviathan Security Group  Who Am I?  •  Adam Cecche0 

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      - Date: 2009-06-02 01:39:34
        5Electromagnetism / Engineering / Electronic engineering / Electronics manufacturing / Electronic design / Emotions / Hope / Positive mental attitude / Security hacker / Hackers: Heroes of the Computer Revolution / Hacker culture / Printed circuit board

        Aal al Beit street, Damascus, Syria. Last day of the presidential election, where there is only one candidate: Bashar al-Assad. Me and Isaam are walking along the crowded sidewalk. We stop at a small kiosk. While standin

        Add to Reading List

        Source URL: carljohanrosen.com

        Language: English - Date: 2014-11-01 13:18:52
        6Fax / Office equipment / Telecommunications equipment / Security hacker / Computing / Technology / Economy

        H-Net Discussion Networks - H-ASIA: CFP: Science & Technolog... 1z2 http://h-net.msu.edu/cgi-bin/logbrowse.pl?trx=vx&list=H-Asia&mo...

        Add to Reading List

        Source URL: www.icohtec.org

        Language: English - Date: 2015-03-28 14:32:49
        7Security / Cyberwarfare / Computing / Computer security / Computer network security / Cybercrime / National security / Threat / Malware / Security hacker / Cyber-Insurance

        training.keywcorp.com This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

        Add to Reading List

        Source URL: training.keywcorp.com

        Language: English - Date: 2016-06-28 22:20:29
        8Cybercrime / Computing / Security / Crime / Identity theft / Social engineering / Cryptography / Crime prevention / Phishing / Password / Computer security / Security hacker

        Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

        Add to Reading List

        Source URL: www.pcisecuritystandards.org

        Language: English - Date: 2015-10-27 10:54:34
        9Web hosting / World Wide Web / Computing / Security / Endurance International Group / HostGator / Computer security / Hack / Security hacker / Web hosting service

        The desperate plea of a hack ed customer... Source: https://www.freelancer.com/projects/Web-Security-Computer-Security/Hostgator-Hosting-Account-was-hacked/ Hosti ng company Hostgator hack ed by former employee

        Add to Reading List

        Source URL: www.whd.global

        Language: English - Date: 2016-03-30 07:51:11
        10Technology / Computing / Media technology / Digital media / Geert Lovink / XS4ALL / Internet / E-democracy / Bulletin board system / Computer network / Security hacker / DirectDraw Surface

        The Rise and Fall of DDS evaluating the ambitions of AmsterdamÕs Digital City

        Add to Reading List

        Source URL: reinder.rustema.nl

        Language: English - Date: 2011-04-20 17:16:48
        UPDATE