Troy Hunt
   HOME
*



picture info

Troy Hunt
Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows users to see if their personal information has been compromised. He has also authored several popular security-related courses on Pluralsight, and regularly presents keynotes and workshops on security topics. He created ASafaWeb, a tool that formerly performed automated security analysis on ASP.NET websites. Data breaches As part of his work administering the Have I Been Pwned? (HIBP) website, Hunt has been involved in the publication of 644 data breaches , and journalists cite him as a cybersecurity expert and data-breach expert. HIBP had recorded more than 5 billion compromised user-accounts. Governments of Australia, United Kingdom and Spain use the service to monitor their official domains. Popular services, such as 1Password, Eve Online, Okta or Kogan have integrated HIBP into their ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

YouTube
YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by Google, and is the List of most visited websites, second most visited website, after Google Search. YouTube has more than 2.5 billion monthly users who collectively watch more than one billion hours of videos each day. , videos were being uploaded at a rate of more than 500 hours of content per minute. In October 2006, YouTube was bought by Google for $1.65 billion. Google's ownership of YouTube expanded the site's business model, expanding from generating revenue from advertisements alone, to offering paid content such as movies and exclusive content produced by YouTube. It also offers YouTube Premium, a paid subscription option for watching content without ads. YouTube also approved creators to participate in Google's Google AdSens ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Okta (identity Management)
Okta, Inc. (formerly Saasure Inc.) is an American identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and devices. It was founded in 2009 and had its initial public offering in 2017, being valued at over $6 billion. Products and services Okta sells 10 products, including Single Sign-On, Universal Directory, Advanced Server Access (formerly ScaleFT), API Access Management, Authentication, User Management, B2B Integration, Multi-factor Authentication, Lifecycle Management, and Access Gateway. Okta sells six services, including a single sign-on service that allows users to log into a variety of systems using one centralized process. For example, the company claims the ability to log into Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computerworld
''Computerworld'' (abbreviated as CW) is an ongoing decades old professional publication which in 2014 "went digital." Its audience is information technology (IT) and business technology professionals, and is available via a publication website and as a digital magazine. As a printed weekly during the 1970s and into the 1980s, ''Computerworld'' was the leading trade publication in the data processing industry. Indeed, based on circulation and revenue it was one of the most successful trade publications in any industry. Later in the 1980s it began to lose its dominant position. It is published in many countries around the world under the same or similar names. Each country's version of ''Computerworld'' includes original content and is managed independently. The parent company of Computerworld US is IDG Communications. History The first issue was published in 1967. Going international The company IDG offers the brand "Computerworld" in 47 countries worldwide, the name and fre ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Certified Ethical Hacker
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the CEH exam is 312-50. This certification has now been made a baseline with a progression to the CEH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment. Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Troy Hunt - 50 Shades Of AppSec Still Frame
Troy ( el, Τροία and Latin: Troia, Hittite: 𒋫𒊒𒄿𒊭 ''Truwiša'') or Ilion ( el, Ίλιον and Latin: Ilium, Hittite: 𒃾𒇻𒊭 ''Wiluša'') was an ancient city located at Hisarlik in present-day Turkey, south-west of Çanakkale and about miles east of the Aegean Sea. It is known as the setting for the Greek myth of the Trojan War. In Ancient Greek literature, Troy is portrayed as a powerful kingdom of the Heroic Age, a mythic era when monsters roamed the earth and gods interacted directly with humans. The city was said to have ruled the Troad until the Trojan War led to its complete destruction at the hands of the Greeks. The story of its destruction was one of the cornerstones of Greek mythology and literature, featuring prominently in the ''Iliad'' and the ''Odyssey'', and referenced in numerous other poems and plays. Its legacy played a large role in Greek society, with many prominent families claiming descent from those who had fought there. In the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


HTTP Public Key Pinning
HTTP Public Key Pinning (HPKP) is an obsolete Internet security mechanism delivered via an HTTP header which allows HTTPS websites to resist impersonation by attackers using misissued or otherwise fraudulent digital certificates. A server uses it to deliver to the client (e.g. web browser) a set of hashes of public keys that must appear in the certificate chain of future connections to the same domain name. For example, attackers might compromise a certificate authority, and then mis-issue certificates for a web origin. To combat this risk, the HTTPS web server serves a list of “pinned” public key hashes valid for a given time; on subsequent connections, during that validity time, clients expect the server to use one or more of those public keys in its certificate chain. If it does not, an error message is shown, which cannot be (easily) bypassed by the user. The technique does not pin certificates, but public key hashes. This means that one can use the key pair to get a cert ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Content Security Policy
Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context. It is a Candidate Recommendation of the W3C working group on Web Application Security, widely supported by modern web browsers. CSP provides a standard method for website owners to declare approved origins of content that browsers should be allowed to load on that website—covered types are JavaScript, CSS, HTML frames, web workers, fonts, images, embeddable objects such as Java applets, ActiveX, audio and video files, and other HTML5 features. Status The standard, originally named Content Restrictions, was proposed by Robert Hansen in 2004, first implemented in Firefox 4 and quickly picked up by other browsers. Version 1 of the standard was published in 2012 as W3C candidate recommendation and quickly with further versions (Level 2) publishe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Project
A project is any undertaking, carried out individually or collaboratively and possibly involving research or design, that is carefully planned to achieve a particular goal. An alternative view sees a project managerially as a sequence of events: a "set of interrelated tasks to be executed over a fixed period and within certain cost and other limitations". A project may be a temporary (rather than a permanent) social system ( work system), possibly staffed by teams (within or across organizations) to accomplish particular tasks under time constraints. A project may form a part of wider programme management or function as an ''ad hoc'' system. Note that open-source software "projects" or artists' musical "projects" (for example) may lack defined team-membership, precise planning and/or time-limited durations. Overview The word ''project'' comes from the Latin word ''projectum'' from the Latin verb ''proicere'', "before an action," which in turn comes from ''pro-'', which d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


United States House Committee On Energy And Commerce
The Committee on Energy and Commerce is one of the oldest standing committees of the United States House of Representatives. Established in 1795, it has operated continuously—with various name changes and jurisdictional changes—for more than 200 years. The two other House standing committees with such continuous operation are the House Ways and Means Committee and the House Rules Committee. The committee has served as the principal guide for the House in matters relating to the promotion of commerce and to the public's health and marketplace interests, with the relatively recent addition of energy considerations among them. Role of the committee The House Committee on Energy and Commerce has developed what is arguably the broadest (non-tax-oriented) jurisdiction of any congressional committee. The committee maintains principal responsibility for legislative oversight relating to telecommunications, consumer protection, food and drug safety, public health, air quality and env ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CloudPets
CloudPets was an Internet-connected soft toy manufactured by now defunct Spiral Toys that was the subject of numerous security vulnerabilities in February 2017. The plush teddy bear-style toys used Bluetooth to connect to a parent's smartphone to allow distant family members to send voice messages to the toy, and allow children to send voice messages back. Security researchers demonstrated that the toy itself was insecure and could be trivially accessed via Bluetooth. The personal records of over 820,000 owners of the toy were stored in an insecure MongoDB database. Attackers also replaced the database with a ransom demand pointing to a Bitcoin address. Data retrieved from the CloudPets database was sent to the Australian security researcher Troy Hunt who included it in Have I Been Pwned?, a database of users whose data has been compromised. The database of user records also contained links pointing to over 2.2 million audio files hosted on Amazon Web Services containing the voice m ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Ashley Madison
Ashley Madison, or The Ashley Madison Agency, is a Canadian online dating service and social networking service marketed to people who are Marriage, married or in relationships. The site has been widely condemned for being a "business built on the back of broken hearts", and is also believed to lie about the size of its userbase by "creating fake accounts, or not stopping others from creating fake accounts". It was founded in 2002 by Darren J. Morgenstern, with the slogan "Life is short. Have an affair". The name comes from two List of most popular given names, popular female names in North America, "Ashley (given name), Ashley" and "Madison (name), Madison". On July 15, 2015, hacker (computer security), hackers Ashley Madison data breach, stole all of its customer data—including emails, names, home addresses, sexual fantasies and credit card information—and threatened to post the data online if Ashley Madison and fellow Avid Life Media site Established Men were not permanen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]