White Hat hacker

Type: Keyphrase
Name: White Hat hacker
First reported Apr 22 2014 - Updated Apr 22 2014 - 1 reports

App Quest: The Need for Web Application Security

Turn on the news, and you’ll see that everyone’s talking about Web apps right now – using the best ones or building the most popular ones. It seems every developer wants to build the hottest app in town. And why shouldn’t they? There’s no denying that ... [Published Security Week - Apr 22 2014]
First reported Apr 17 2014 - Updated Apr 17 2014 - 1 reports

It’s Time to Encrypt the Entire Internet

The Heartbleed bug crushed our faith in the secure web, but a world without the encryption software that Heartbleed exploited would be even worse. In fact, it’s time for the web to take a good hard look at a new idea: encryption everywhere.Most major ... [Published Wired News - Apr 17 2014]
First reported Apr 17 2014 - Updated Apr 17 2014 - 1 reports

Gaming Update: 'Watch Dogs,' 'Dragon Age: Inquisition,' 'Magic 2015,' GameSpy Shutdown

Watch DogsDetails of the Watch Dogs Season Pass have leaked. If GameStop's listing is to be believed, the pass will net gamers a single-player campaign featuring a new playable character, in addition to new missions and weapons. It will cost $20. PlayStation ... [Published Stack TV - Apr 17 2014]
First reported Apr 16 2014 - Updated Apr 16 2014 - 1 reports

As brands fall short in their storytelling…

Everywhere you look right now, storytelling is the next panacea for all communication-ills.When people communicate they want to be heard, understood and remembered, but the way brands tell their stories is falling short. At least that was a thought that ... [Published Digital Market Asia - Apr 16 2014]
First reported Apr 16 2014 - Updated Apr 16 2014 - 1 reports

Finding high-tech flaws for fun and an optional profit

NATHANIEL CAREW makes a living protecting computer systems. In his spare time, he hacks into Google.But far from trespassing, Mr Carew has Google's blessing to explore its network. He is a ''white hat'' hacker, using his powers for good instead of evil ... [Published WA Today - Apr 16 2014]
First reported Apr 13 2014 - Updated Apr 13 2014 - 1 reports

Security Brief: Heartbleed Bug, Google Vulnerabilities, Arrested Hackers

In case you haven’t been online too much over the past week or if you fear you might have missed some important stories, here’s your chance to catch up.Heartbleed BugThe Heartbleed bug, the OpenSSL vulnerability that can be exploited to obtain sensitive ... [Published Softpedia - Apr 13 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

Hacker gets 15 months for attack on Israeli group

ST. LOUIS  •   A hacker from the St. Louis area who now lives in California was sentenced Thursday to 15 months in federal prison for a series of online attacks against an Israeli organization.Jonathan Cowden, 29, pleaded guilty in August to fraudulent ... [Published STLtoday.com - Mar 27 2014]
First reported Mar 24 2014 - Updated Mar 24 2014 - 1 reports

Watch_Dogs sneaks out new trailer

Looking forward to infiltrating the digital streets of Watch_Dogs? The latest trailer reveals that prospective cyber sleuths with a PlayStation 3 or 4 are going to be able to dig into the system a little bit deeper.Along with an exclusive 'white hat hacker' ... [Published ShortList.com - Mar 24 2014]
First reported Mar 21 2014 - Updated Mar 21 2014 - 1 reports

Snoopy drone tricks smartphones into spilling your secrets

There’s a new Snoopy in the sky, and this one isn’t flying a doghouse and dueling with the Red Baron. This Snoopy is a drone , and it’s out to steal private data from unwary smartphone, tablet, and laptop users.Snoopy is the creation of white hat hacker ... [Published Geek.com - Mar 21 2014]
First reported Mar 19 2014 - Updated Mar 19 2014 - 1 reports

Testing Your Dedicated Server Defenses

Defending-dedicated-servers-from-attacks-261539_63 - Mar. 19, 2014 - HILLSBORO, Ore. -- Configuring and defending your dedicated server against attacks from outside your network or datacenter is good practice, however actually testing the defenses is ... [Published Prlog - Mar 19 2014]
First reported Feb 20 2014 - Updated Feb 20 2014 - 2 reports

Cyber-security: White hats to the rescue

ANDREW WHITAKER has made a career out of breaking into things. A “white hat” hacker in techie jargon, Mr Whitaker leads a team of security specialists at Knowledge Consulting Group who spend their days trying to worm their way into clients’ computer systems ... [Published The Economist - Feb 20 2014]
First reported Feb 20 2014 - Updated Feb 20 2014 - 1 reports

Concerns over Asus and Linksys router vulnerabilities

White hat hacker discloses router vulnerabilities that might only be fixed when new firmware versions are deployed.The continuing problem of broadband router/modem vulnerabilities hit the security spotlight overnight, after it emerged routers from both ... [Published SC Magazine UK - Feb 20 2014]

Quotes

"We're working on finding a transition, but still have technical hurdles to overcome," EA told IGN . "We will make an announcement when there is news to share."
''The more eyes the better,'' he said. "There are some extremely creative and clever people in the wider security community, and they may have thought of things we haven't. Engaging this talent has been productive and fun."
"Super surprise announcement Batman, you’re about to star in a new game!?"
"While users of affected routers could purchase a different model from another vendor, there's no guarantee that the replacement would be less susceptible to other, as yet undiscovered vulnerabilities" he said

More Content

All (28) | News (19) | Reports (0) | Blogs (9) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
App Quest: The Need for Web Application Security [Published Security Week - Apr 22 2014]
App Quest: The Need for Web Application Security [Published SecurityWeek RSS Feed - Apr 22 2014]
It’s Time to Encrypt the Entire Internet [Published Wired News - Apr 17 2014]
Gaming Update: 'Watch Dogs,' 'Dragon Age: Inqui... [Published Stack TV - Apr 17 2014]
As brands fall short in their storytelling… [Published Digital Market Asia - Apr 16 2014]
Finding high-tech flaws for fun and an optional... [Published WA Today - Apr 16 2014]
Security Brief: Heartbleed Bug, Google Vulnerab... [Published Softpedia - Apr 13 2014]
McAfee CSO article stirs up the whitehat infose... [Published SiliconANGLE - Mar 31 2014]
Hacker gets 15 months for attack on Israeli group [Published STLtoday.com - Mar 27 2014]
MIT Web development platform seeks to prevent a... [Published SD Times - Mar 25 2014]
Watch_Dogs sneaks out new trailer [Published ShortList.com - Mar 24 2014]
Snoopy drone tricks smartphones into spilling y... [Published Geek.com - Mar 21 2014]
Why I'm Rooting for Flight 370 Hijackers, and W... [Published Esquire - Mar 20 2014]
Testing Your Dedicated Server Defenses [Published Prlog - Mar 19 2014]
Here Are 10 Former Hackers Who’ve Gone On ... [Published EFYTimes.com - Mar 19 2014]
B-Sides SF: 'Sexism can be security vulnerability' [Published Latest articles from SC Magazine UK News - Feb 25 2014]
Cyber-security: White hats to the rescue [Published The Economist - Feb 20 2014]
Cyber-security: White hats to the rescue [Published The Economist - Business - Feb 20 2014]
Concerns over Asus and Linksys router vulnerabi... [Published SC Magazine UK - Feb 20 2014]
Private photos exposed in Instagram hack [Published IT News Australia - Feb 11 2014]
Obama Administration Knew of Healthcare.gov Sec... [Published Washington Free Beacon - Dec 19 2013]
Congress Presses Obama on Healthcare.gov Securi... [Published Washington Free Beacon - Dec 12 2013]
Robert Hurt: Healthcare website poses major cyb... [Published Augusta Free Press - Dec 03 2013]
In Light of Healthcare.gov Security Issues, Bop... [Published PRWeb - Nov 22 2013]
Obamacare Website Compromised; Security Issues ... [Published Security Bloggers Network - Nov 21 2013]
Mr. President, Tear Down This Website [Published Breitbart Feed - Nov 20 2013]
BlackHat USA 2012 - Control-Alt-Hack(TM): White... [Published SecurityTube.Net - Nov 14 2013]
Barnaby Jack [Published Telegraph - Jul 28 2013]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
App Quest: The Need for Web Application Security [Published SecurityWeek RSS Feed - Apr 22 2014]
Turn on the news, and you’ll see that everyone’s talking about Web apps right now – using the best ones or building the most popular ones. It seems every developer wants to build the hottest app in town. And why shouldn’t they? There’s no denying ...
McAfee CSO article stirs up the whitehat infose... [Published SiliconANGLE - Mar 31 2014]
An article published by Security Magazine online by McAfee Chief Security Officer Brent Conran earlier this month has created a storm of controversy in the infosec community.  Posted under the category ‘Cyber Safety’ and entitled ‘Why Not to Hire ...
B-Sides SF: 'Sexism can be security vulnerability' [Published Latest articles from SC Magazine UK News - Feb 25 2014]
Security researcher - and white hat hacker - Raven Alder addressed sexism in the InfoSec world at the B-Sides San Francisco event on Monday, and said - perhaps surprisingly - that it can help and hinder attackers and defenders in equal measure. ...
Cyber-security: White hats to the rescue [Published The Economist - Business - Feb 20 2014]
ANDREW WHITAKER has made a career out of breaking into things. A “white hat” hacker in techie jargon, Mr Whitaker leads a team of security specialists at Knowledge Consulting Group who spend their days trying to worm their way into clients’ computer ...
Obama Administration Knew of Healthcare.gov Sec... [Published Washington Free Beacon - Dec 19 2013]
Documents provided to the House Committee on Government Oversight and Reform reveal that the Obama administration knew of security vulnerabilities within Healthcare.gov prior to Oct. 1, but launched the website anyway. Chairman Darrel Issa (R., Calif.) ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.