Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook
🕴 @Phantasm_Lab
Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.🕴 @Phantasm_Lab
Forwarded from Zer0 to her0 (Jonhnathan Jonhnathan Jonhnathan)
BlueHat v18 - Microsoft Conference Center
https://blogs.technet.microsoft.com/bluehat/
🕴🏼 @Phantasm_Lab
Announcing the BlueHat v18 Schedule:
Where did the summer go? This year the BlueHat Security Conference moved forward in the schedule to late September. Next year it will settle into a steady orbit of early October moving forward. With that change in schedule, it is hard to believe that it is time to reveal the schedule for BlueHat v18. We had nearly one hundred fifty submissions spanning the gamut of security topics and presenters. That made for some tough choices for the content advisory board and a schedule that will leave wishing you could be in multiple talks at the same time. On behalf of the content advisory board, I want to thank everyone who submitted a paper for consideration. There were a lot of great ideas, but we could not put all of them on stage for this instance of BlueHat. We look forward to continuing the security conversation with you in the future.
https://blogs.technet.microsoft.com/bluehat/2018/08/02/announcing-the-bluehat-v18-schedule/https://blogs.technet.microsoft.com/bluehat/
🕴🏼 @Phantasm_Lab
Bugcrowd University Opens Its Doors to the Crowd
https://www.bugcrowd.com/press-release/bugcrowd-university-opens-its-doors-to-the-crowd/?utm_source=social&utm_medium=facebook&utm_content=press_release&utm_campaign=bcu
🕴 @Phantasm_Lab
Bugcrowd University addresses the skill shortage by introducing new researchers to the crowdsourced security field and upleveling the skills of the white hat hacker community across the board. In tandem, Bugcrowd is pushing forward with the Bugcrowd Ambassador Program to foster new researchers. Researchers who take part in this program will learn new skills and hone old ones, and help spread the skills needed to shorten the cybersecurity gap.
“Making Bugcrowd home for researchers is one of our highest priorities. The goal of Bugcrowd University is to empower researchers with training and content to strengthen the security community,” said Jason Haddix, VP of Trust & Security, Bugcrowd. “With this Bugcrowd University program we will not only train and empower our Crowd to find high-priority vulnerabilities, we will also introduce this model to would-be security researchers around the world to increase the number of skilled researchers looking for vulnerabilities.”https://www.bugcrowd.com/press-release/bugcrowd-university-opens-its-doors-to-the-crowd/?utm_source=social&utm_medium=facebook&utm_content=press_release&utm_campaign=bcu
🕴 @Phantasm_Lab
Types of firewall | network firewall security | TechTerms
🕴 @Phantasm_Lab
Learn different types of firewall
https://www.youtube.com/watch?v=aUPoA3MSajU🕴 @Phantasm_Lab
YouTube
What is firewall? | Types of firewall | network firewall security | TechTerms
Learn different types of firewall, types of firewall software, types of hardware firewall, different types of firewalls, types of firewalls, types firewall, types of firewalls in network security, different types of hardware firewalls, types of firewall,…