troyhunt   51

« earlier    

Have you been 'pwned' in a data breach? Troy Hunt can tell • The New York Times
<p>Hunt was invited to appear before Congress in late November to help lawmakers wrestle with this growing crisis of consumer data theft. In just the past two years, attackers have stolen sensitive information about hundreds of millions of people from the credit bureau Equifax, popular online services such as Uber and too many other companies to count.

Much of that stolen data flows directly into the black market. "Data breaches are another commodity, like heroin," Hunt testified Thursday before the House Energy and Commerce Committee.

Hunt's unlikely path from Queensland's Surfers Paradise Beach to what he describes as "fancy government things" on Capitol Hill has been a running joke since his invitation to testify was announced. Virginia Republican Rep. Morgan Griffith, introducing Hunt to lawmakers, noted that he "put on a suit and tie for us when he normally wears jeans and a black T-shirt."

Hunt said he splurged on the brand-new Hugo Boss suit and Australian outback-style boots because he didn't have anything else to wear. He also downloaded an app that instructed him on how to tie his necktie.

"Doing my best 'no really, I'm a professional' impersonation," he tweeted from the U.S. Capitol steps shortly before the hearing. "Did it work?"</p>
troyhunt  data  hacking 
december 2017 by charlesarthur
Passwords Evolved
Authentication Guidance for the Modern Era.
troyhunt  security  authentication 
july 2017 by alastc
Troy Hunt on Twitter: "As of Jan last year, Dropbox had less than 1% of their user base using the optional 2FA (this was before their hacked data was released) https://t.co/ds3wOXAzEb"
As of Jan last year, Dropbox had less than 1% of their user base using the optional 2FA (this was before their hacked data was released) pic.twitter.com/ds3wOXAzEb

— Troy Hunt (@troyhunt) July 25, 2017
FavoriteTweet  troyhunt 
july 2017 by mjtsai

« earlier    

related tags

--frequent  2012  2016  2018  analysis  anonymity  apple  arstechnica  attack  australia  authentication  azure  bestpractice  blog  blogs  briankrebs  browser  browsers  business  character  chine  cookies  copy-paste  copy  cors  credentials  csrf  culture  data  data_breach  database  delicious  demo  development  devices  domain  dotnet  doubleposting  dsgvo  dylanhoulihan  education  email  en  errorhandling  ethics  eu  fail  favoritetweet  field  funny  future  gdpr  hack  hacking  hibp  howto  hsts  https  icloud  incognito  infosec  injection  internet  internetofshit  ios  iot  ipad  iphone  johnmeister  language  leak  learning  links  logging  login  mailinator  manager  mfa  microsoft  mikegustavison  mobile  ms  onlinecourses  onlineeducation  owasp  panera  password  passwords  paste  payments  pgp  pin  pluralsight  practical  privacy  privacyandsecurity  programming  pwnage  pwned  ransom  ransomware  raygun.io  read  region  reset  review  saranen  scary  security  service  shaming  smarthome  sony  sql  sqlinjection  ssl  tech  tesco  tfa  thislinkwastweetedorretweetedorfavoritedby@nmandautodeflectedtodelicious  timezone  tips&tricks  tld  tls  tor  training  tutorial  tutorials  tweet  ubiquitinetworks  unicode  video  wannacrypt  web  webdev  websecurity  why  xss 

Copy this bookmark:



description:


tags: