Tag Archive for: ROUNDTABLE

Ex-hackers roundtable discusses 1990s hacking, security industry // The Observer


Notre Dame faculty Walter Scheirer and Luis Felipe Murillo began teaching a course last spring called “The Archaeology of Hacking: Everything You Wanted to Know About Hacking but Were Afraid to Ask.” On Thursday, the two faculty members held a hacker roundtable where 1990s hacking and its evolution were discussed by three ex-hackers and a professor of anthropology.

The panel was mediated by Gabriella Coleman, a Harvard professor of anthropology focusing on hacking and computing. Panelists included Rocky Witt, a senior security engineer in the cryptocurrency industry; Mike Schiffman, lead of network security engineering at Google and Stephen Watt, a software engineer at DomainTools. Witt, Schiffman and Watt were all former hackers.

Each panelist introduced themselves and told the story of how they became interested in hacking.

Witt said his family received their first computer in the mid-1990s. 

“I was very bored in school, very bored in my small town and I turned to mischief to keep myself entertained,” he said.

Witt’s first attempt to gain unauthorized access into systems was copying login strings.

Schiffman said his first experience with a computer was with a Commodore VIC 20, which was owned by his father.

Schiffman’s friend introduced him to the hacking world, where he used an Internet Relay Chat (IRC) to “consume information.”

Watt received his first computer around 1991, when he was about eight years old. 

“I got online because I grew up in Florida — weather was too hot,” Watt said. “Shortly thereafter, I started dialing up some local bulletin boards with my modem. From there, I started getting into pirating software.”

When Coleman asked about the “multifaceted” social scene among hackers in the 1990s, Witt mentioned the vast use of IRCs in “looking for sources of information or people who can teach you something.”

“Back in the day, it was probably a lot more likely that [security vulnerabilities with ‘zero days’ left to protect] would actually leak. You’d have … a closed network of people sharing information between trusted friends and somebody might just publish it,” Watt said.

Watt said an interested hacker would usually…

Source…

Cybersecurity needs to be one of India’s topmost priorities for long term growth: Leaders at Microsoft’s ‘Future of Security’ Roundtable


As we navigate an increasingly complex, boundaryless hybrid world, cybersecurity has never been more critical. With cyberattacks growing in size, scale and sophistication, cybersecurity becomes mission-critical for protecting individuals, businesses, and governments.

Against this backdrop, and as part of Cybersecurity Awareness Month, Microsoft hosted a Future of Security curated dialogue with industry experts, on building India’s cyber resilience. Terence Gomes, Country Head – Security, Microsoft India, was in conversation with Seema Khanna, Deputy Director General, National Informatics Centre (NIC), Government of India, Rama Vedashree, Former CEO, Data Security Council of India (DSCI), and Satish Kumar Dwibhashi, SVP and CISO, InMobi, on the evolution of the cybersecurity landscape and the need for public-private partnerships to protect India at scale.

Trust in technology, need for stronger collaboration between the public and private sectors, driving consumer awareness, and the role of secure, trusted, ethical tech in driving innovation for India were some of the topics that were discussed.

Anchoring these discussions, Microsoft shared its commitment to building a trusted tech ecosystem in the country, making available the technology and threat intelligence expertise required to protect against cyber threats.

 

Key excerpts from the discussion:

Trust in technology

Seema Khanna: “Trust in technology cannot work in silos, they go hand-in-hand. Earning trust is easy, but we only get one shot at it. Both as government and industry, we must navigate earning the trust from users. For this, we need to have an enabling framework for services. Security must be by design and every service we provide needs to be built with trust, especially in the hybrid world.”

Satish Kumar Dwibhashi: “We are living in a digital world. So, digital trust is a necessity. It is no longer a choice, but imperative in today’s world.”

Rama Vedashree: “We need to take a step back and acknowledge how much has moved to digital now. Digital technologies are now being used for very personal, very sensitive information. This is exactly why trust in technology is receiving so much…

Source…

Takeaways: Slator’s Roundtable on Cybersecurity, Privacy, and Data Protection in Asia – Slator (press release) (subscription)


Slator (press release) (subscription)

Takeaways: Slator's Roundtable on Cybersecurity, Privacy, and Data Protection in Asia
Slator (press release) (subscription)
Data breaches occur ever more frequently. As a consequence, laws and regulations governing data privacy, data protection, and cybersecurity have been multiplying. The need could not be more urgent. In the last three months alone, at least three hacking …

data breach – Google News

Careful: Google AdWords Phishing Emails – Search Engine Roundtable

Google has confirmed a large email phishing attempt on their AdWords customers over the past day or two. Bindu from the Google AdWords team explained in a Google AdWords Help thread the email going out that is a phishing attempt is titled “We stopped …
Read more