Videos Tagged with "Javvad Malik"

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Rafal Los at Black Hat EU 2012

April 12, 2012

We were fortunate to get an interview with HP's Global Software Security Evangelist Rafal Los at Black Hat Europe where he speaks about threat modeling and how we can stop determined attackers. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Steve Lord at Black Hat EU 2012

April 10, 2012

Steve Lord, penetration tester extraordinaire and co-founder of 44Con, was at Black Hat Europe 2012 to talk about compromising MiFi (portable WiFi) devices to use for nefarious and not so nefarious purposes. But mainly for nefarious purposes (insert manic laughter)...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Phil Polstra at Black Hat EU 2012

April 07, 2012

At Black Hat Europe, we had a chance to catch up with Phil Polstra to give us the low down on his pet USB projects and an interesting speaker timer on the side. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Guess Who's Not going to Black Hat Europe 2012

March 05, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

FBI and Coffee: How to Spot Suspicious Activity

March 03, 2012

According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Javvad Malik and Black Hat Europe 2012

February 19, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Auditor IV: The Card Data Breach

February 17, 2012

When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Importance of Online Safety

January 28, 2012

Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Interview with ISMP Founder Marisa Fagan on SECore

January 27, 2012

Marisa Fagan, the founder of the InfoSec Mentors Project - "a non-profit project that builds a more collaborative and friendly environment for newbies in information security" - kindly dropped by from across the pond to talk about SECore.info...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Do Not Encrypt Passwords - Why, You Ask?

January 12, 2012

Encrypting passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

Page « < 1 - 2 > »