Romi KumarIs Your Smartphone a Hackers HubSmartphones are your on the go everything, from financial transactions to professional communications to entertainment — reasons why…Jul 9, 2019Jul 9, 2019
Kamil GorskiBlockchain: How can “Security’s Game Changer” be so Insecure?Merely couple of years ago many people considered blockchain a geek thing, a fad or a bubble. Their opponents claimed it was a hack-proof…Jun 25, 2019Jun 25, 2019
Jerry WilliamsHow Hacking Works at Coffee ShopsHackers can exploit smart home appliances like coffee machines and TVs to steal people’s sensitive information. According to Vince…May 21, 2019May 21, 2019
Jeff HuLearn Blockchain’s Top 25 Hacks in HistoryRevealing techniques of 25 successful attacks on blockchain: from 2010 to 2018, $1.8+ billion USD.Feb 8, 2019Feb 8, 2019
Michaël TrazziHow my Friend Got an Internship at Tesla After Only 8 Months of Coding"Hey, you’re Elon’s best friend now, huh?” I asked my friend, who has been interning at Tesla for the past 3 months. “You have no idea”Jan 24, 20196Jan 24, 20196
KaylaMatthewsThe Current State of the ‘Hackers-for-Hire’ MarketPeople don’t have to look for very long to find instances of malicious hackers who breach databases and steal information to sell or…Jan 14, 201914Jan 14, 201914
Taryn CalicoRadioGoogle Making Lemonade with their Berlin LemonsBerlin-based hacker and ‘Fuck Off Google’ campaign organizer, Larry Pageblank, argues Google is far from finished with Berlin, as they…Jan 11, 2019Jan 11, 2019
mike fettisDot file automation: part 2If something is worth doing, it is worth overdoing. The first part of this series dealt with getting basic dot file automation up and…Dec 24, 2018Dec 24, 2018
mike fettis.dot files automation.Sharpen and clean your tools to make them last longer. Hone your tools to make them more precise. The tools of a SRE start with the…Dec 6, 20181Dec 6, 20181
mike fettissudo make me a sandwich. Then I’ll pwn your fridge.Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user…Dec 6, 2018Dec 6, 2018