‘Legacy system’ exposed Black Hat 2018 attendees’ contact information

A “legacy system” was to blame for exposing the contact information of attendees of this year’s Black Hat security conference. Colorado-based pen tester and security researcher who goes by the handle NinjaStyle said it would have taken about six hours to collect all the registered attendees’ names, email and home addresses, company names, and phone […]

View More ‘Legacy system’ exposed Black Hat 2018 attendees’ contact information

Cryptocurrency insecurity: IOTA, BCash and too many more

Cryptocurrencies: a weird agglomerate of fascinating technology built by brilliant engineers; a whole new and potentially important form of economics; … and hype-machine puffed-up crazy-talk nonsense. So, as you might expect, they also combine state-of-the art resilient engineering and comical clown-car so-called security. Yes, that’s right — I want to talk about IOTA, and (to […]

View More Cryptocurrency insecurity: IOTA, BCash and too many more