White Hat hacker

Type: Keyphrase
Name: White Hat hacker
First reported Sep 20 2014 - Updated Sep 20 2014 - 1 reports

Online security: Pakistani helps Google avoid privacy disaster

Rafay Baloch identi­fied a major vulner­abilit­y in the Androi­d OS.While Baloch’s research led to the fixing of the bug, Google disqualified him for any reward for his contribution. DESIGN: ESSA MALIKKARACHI:  A Pakistani security researcher has helped ... [Published The Express Tribune - Sep 20 2014]
Entities: Baloch, Android, Security
First reported Sep 18 2014 - Updated Sep 18 2014 - 1 reports

GAO: Healthcare.gov Security, Privacy Weaknesses Still Exist

(WASHINGTON) -- An audit released by the Government Accountability Office on Wednesday says that some privacy and security flaws that existed when Healthcare.gov was launched still remain months later.The GAO noted that many systems and entities must ... [Published 1070wapi.com - Sep 18 2014]
First reported Sep 17 2014 - Updated Sep 17 2014 - 1 reports

Today's security hacks are after more than bank info

Credit: ThinkstockThe beat goes on. In recent weeks, both JP Morgan Chase and Home Depot have been identified as the latest victims of large-scale cyberattacks.JP Morgan Chase was among a handful of U.S. banks hit by hackers in a series of attacks in ... [Published CIO-Asia - Sep 17 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

We Need More Than Penetration Testing

Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ... [Published TaoSecurity - Sep 16 2014]
First reported Sep 08 2014 - Updated Sep 08 2014 - 1 reports

Meet the white hat hacker

The days when hackers wore their anonymous masks with pride are fast sliding into the past. In a universe ruled by whirling worldwide web, hacking is becoming an eligible job qualification. India, it seems, is not far behind. Prime minister Narendra Modi ... [Published Financial Chronicle - Sep 08 2014]
First reported Sep 02 2014 - Updated Sep 02 2014 - 1 reports

Anonymous Apps are Not so Anonymous After All

Users are flocking to anonymous apps this year, seemingly enticed by the concept of posting something without having to own up to it. If a post can’t be tracked back to a user, they can say anything they want, for better or worse . According to white ... [Published Social Times - Sep 02 2014]
First reported Aug 25 2014 - Updated Aug 25 2014 - 1 reports

Hack exposes Secret app confessions

Anonymous confessions posted on a popular app, called “ Secret ,” were susceptible to being exposed via a hack. The attack, detailed Friday by Wired , was discovered by white hat hacker Ben Caudill, who disclosed the vulnerability to the app maker under ... [Published SC Magazine US - Aug 25 2014]
First reported Aug 22 2014 - Updated Aug 23 2014 - 2 reports

Secret app constantly patching, becoming more secret

This week white hat hacker Ben Caudill has revealed the identity of a friend in the app Secret. He’s done this with a simple method that allows him to identify the Secrets (generally anonymous) posted by those he has on his contacts list. While this ... [Published SlashGear - Aug 22 2014]
Entities: White Hat hacker
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

There’s a stupidly simple but tedious trick to identify your friends on Secret

Popular app Secret may offer you a way to publicly and anonymously share some of the things you’re really not supposed to tell or you wouldn’t want to otherwise share with others, but that doesn’t mean your identity remains concealed at all times. In ... [Published Yahoo! News - Aug 22 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Your Anonymous Posts to Secret Aren’t Anonymous After All

White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. “Is that you?” he asks. It is, but nobody was supposed to know. He’s showing me one of my ... [Published Wired Threat Level - Aug 22 2014]
First reported Aug 18 2014 - Updated Aug 18 2014 - 2 reports

White hat hacker returns to Australia for the NBN

Whitehack owner and director Adrian Wood returned to Australia from Alaska in the United States partly because he could access the National Broadband Network (NBN) for his business.Wood, who is originally from Tamworth, began his company, which focuses ... [Published Computerworld Australia - Aug 18 2014]
First reported Aug 07 2014 - Updated Aug 08 2014 - 2 reports

Square Will Now Pay Hackers For Reporting Bugs Responsibly

 If you consider yourself something of a white hat hacker, listen up: you’ve got a new service to poke at without fear of getting hauled into court, and it’s a big one. Last night at the BlackHat security conference, Square’s resident hacker Dino Dai ... [Published TechCrunch - Aug 07 2014]

Quotes

...Until the CMS addresses the existing weaknesses, the GAO warns, "unnecessary risks remain of unauthorized access, disclosure, or modification of the information" users may input
...The hackers are saying of the U S , "They're weak and we're going to continue to attack them."
Poneman is a bit more positive, saying that a lot of very smart people are working on the issue. "The good news is that companies and security experts are on top of it" he says. "The bad news is that we can't stop it."
...He can often be overheard saying things like "Get a Mac!" and "Data wins arguments,” wandering around the downtown area at least five days a week. Follow him on Twitter at @ronstauffer or email him at indy@ronstauffer.com . Questions, comments and snide remarks are always welcome."

More Content

All (28) | News (16) | Reports (0) | Blogs (12) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Online security: Pakistani helps Google avoid p... [Published The Express Tribune - Sep 20 2014]
GAO: Healthcare.gov Security, Privacy Weaknesse... [Published 1070wapi.com - Sep 18 2014]
Today's security hacks are after more than bank... [Published CIO-Asia - Sep 17 2014]
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Today's Security Hacks Are After More Than Bank... [Published NetworkWorld - Sep 16 2014]
5 Steps to Uncovering Your IT Security Gaps [Published SitePoint - Sep 10 2014]
Meet the white hat hacker [Published Financial Chronicle - Sep 08 2014]
Anonymous Apps are Not so Anonymous After All [Published Social Times - Sep 02 2014]
Hack exposes Secret app confessions [Published SC Magazine US - Aug 25 2014]
There’s a stupidly simple but tedious trick to ... [Published Yahoo! News - Aug 22 2014]
Secret app constantly patching, becoming more s... [Published SlashGear - Aug 22 2014]
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Your Anonymous Posts to Secret Aren’t Anonymous... [Published Wired Threat Level - Aug 22 2014]
White hat hacker returns to Australia for the NBN [Published Computerworld Australia - Aug 18 2014]
White hat hacker returns to Australia for the NBN [Published Computerworld - Security RSS feed - Aug 18 2014]
It’s a bird, it’s a plane, it’s a drone? [Published Colorado Springs Independent - Aug 16 2014]
Square Will Now Pay Hackers For Reporting Bugs ... [Published TechCrunch - Aug 07 2014]
Square Will Now Pay Hackers For Reporting Bugs ... [Published TechCrunch Europe - Aug 07 2014]
Prosecutors Can Screw With Hackers Just for Say... [Published REASON Online - Jul 23 2014]
Why Elle's Profile Of Google's "Security Prince... [Published ReadWriteWeb - Jul 15 2014]
App Quest: The Need for Web Application Security [Published SecurityWeek RSS Feed - Apr 22 2014]
It’s Time to Encrypt the Entire Internet [Published Wired News - Apr 17 2014]
Security Brief: Heartbleed Bug, Google Vulnerab... [Published Softpedia - Apr 13 2014]
McAfee CSO article stirs up the whitehat infose... [Published SiliconANGLE - Mar 31 2014]
B-Sides SF: 'Sexism can be security vulnerability' [Published Latest articles from SC Magazine UK News - Feb 25 2014]
Cyber-security: White hats to the rescue [Published The Economist - Feb 20 2014]
Cyber-security: White hats to the rescue [Published The Economist - Business - Feb 20 2014]
Private photos exposed in Instagram hack [Published IT News Australia - Feb 11 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ...
Secret app constantly patching, becoming more s... [Published SlashGear - Aug 22 2014]
This week white hat hacker Ben Caudill has revealed the identity of a friend in the app Secret. He’s done this with a simple method that allows him to identify the Secrets (generally anonymous) posted by those he has on his contacts list. While this ...
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the owner of those secrets. As Wired reports ...
Your Anonymous Posts to Secret Aren’t Anonymous... [Published Wired Threat Level - Aug 22 2014]
White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. “Is that you?” he asks. It is, but nobody was supposed to know. He’s showing me one of my ...
White hat hacker returns to Australia for the NBN [Published Computerworld - Security RSS feed - Aug 18 2014]
Whitehack owner and director Adrian Wood returned to Australia from Alaska in the United States partly because he could access the National Broadband Network (NBN) for his business. ...
1 2 3
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.