PortSwigger - Latest Web Hacking Tools Q1 2020

PortSwigger - Twisted Programming Framework Stung by Request Smuggling Vulnerabilities

Dark Reading - Vulnerability Researchers Focus on Zoom App's Security

PortSwigger - GadgetProbe and Bug Bounties

Risky Business Information Security Podcast #574 - GadgetProbe

Pentester Land Newsletter - How To Write Like It’s Your Job

Mashable - Major Domain Name Bug Allowed Hackers to Register Malicious Domains

SecurityWeek - A Zero-Day Homograph Domain Name Attack

Breaking Badness Podcast - The Human Element with Brianne Hughes

Security Boulevard - Researcher Discovers Zero Day Vulnerability Using Homoglyph Characters

BleepingComputer - Zero-Day Bug Allowed Attackers to Register Malicious Domains

PortSwigger - GadgetProbe: New Tool Simplifies the Exploitation of Java Deserialization Vulnerabilities

Dark Reading - What Your Company Needs to Know About Hardware Supply Chain Security

MSSP Alert - Bishop Fox Unveils Continuous Testing Managed Security Service

Yahoo Finance - Bishop Fox Introduces First-of-its-Kind Continuous Attack Surface Testing Managed Security Service

SecurityWeek - RSA Conference 2020: Product Announcement Summary

Bishop Fox Wins Three 16th Annual Info Security Products Guide Awards

Bishop Fox Wins Three Cyber Defense Magazine InfoSec Awards for 2020

Bishop Fox Introduces First-of-its-Kind Continuous Attack Surface Testing Managed Security Service

Vinnie Liu Wins a Cybersecurity Professional of the Year Award

Pentester Land Newsletter - Dufflebag

Business of Tech Podcast - Huntress Labs Discusses Disclosures

Channele2e - ConnectWise Control: Bishop Fox and ConnectWise Perspectives

Channel Futures - Wake-Up Call: What the ConnectWise Control Security Vulnerabilities Mean

Lawrence Systems - Video: ConnectWise Control Disclosure by Bishop Fox

TIME - Should You Reconsider Using WhatsApp After the Jeff Bezos Hack?

Tech Decisions - ConnectWise Works To Resolve Vulnerabilities Identified By Testing Firm

The CyberWire - ConnectWise Adivisory Coverage

CRN - ConnectWise Control Security Issues Are Tip of Iceberg

DarkReading - Eight Flaws in MSP Software Highlight Potential Ransomware Vector

Huntress Labs - Validating the Bishop Fox Findings in ConnectWise Control

CRN - ConnectWise Exploit: 20 Questions For A Security Researcher

CRN - ConnectWise Control Security Vulnerabilities Are ‘Severe'

Ars Technica - Inside TASBot’s effort to control the Nintendo Switch

SecurityWeek - High Risk Vulnerabilities Addressed in Big Monitoring Fabric

PortSwigger - High Risk Vulnerabilities Found in Network Traffic Monitoring Tool

Vice - Hackers Discuss the 'Mr. Robot' Series Finale

PortSwigger - Telerik UI for ASP.NET AJAX Vulnerable to RCE Attacks

Dark Reading - Get Organized Like a Villain

CSO - You Just Got Hacked…By a Drone?

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 8: ‘Request Timeout’

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 7: ‘Proxy Authentication Required’

Popular Mechanics - How SMS Works and Why You Shouldn't Use It

Bishop Fox Acquires SoNeMo Technologies; Founder Joins Barcelona Office

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 5: 'Method Not Allowed'

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 4: 'File Not Found'

I Programmer - Cyber.dic - Spellchecking For Tech Terms and Acronyms

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 3: 'Forbidden'

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 2: 'Payment Required'

Bishop Fox Wins Acquisition International's Best Penetration Testing Specialists Award

Vice - A Roundtable of Hackers Dissects 'Mr. Robot' Season 4 Episode 1

Duo Security - How to Monitor GitHub for Secrets

Business Insider - Bishop Fox Wins "Web Filtering and Control Solution of the Year" Award

Bishop Fox Wins “Web Filtering and Control Solution of the Year” Award

Dark Reading - 6 Best Practices for Performing Physical Penetration Tests

Ed Leichtnam Joins Bishop Fox as Associate VP of Project Management

Jamie Fiedrich Joins Bishop Fox as VP of IT Operations

AZ Big Media - Jackie Todd and Mark Pavlick Join Bishop Fox

Mark Pavlick Joins Bishop Fox as Head of Sales

Help Net Security - Red Teaming: Why a Forward Offense is the Best Defense

Consulting.us - Bishop Fox Appoints Two Associate VPs

MSSP Alert - Bishop Fox Discovers Medical Equipment Vulnerability

Bishop Fox Researchers Discover High-Risk Vulnerability in OpenEMR

Business Insider - Jackie Todd Joins Bishop Fox as Assciate VP of Resource Management

Jackie Todd Joins Bishop Fox as Associate VP of Resource Management

GrowthList - 20 Cyber Security Startups You Should Get To Know

DigitalMunition - Joe Sechman Joins Bishop Fox as Associate VP of Product Research and Development

ZigDiggity Featured in Bug Bytes

Joe Sechman Joins Bishop Fox as Associate VP of Product Research and Development

TechBeacon - Weaponized Machine-Learning Tool Adds Punch to Pen Testing

Enterprise IT News - Tales of the Leaky Cloud

TechCrunch - What Security Pros Need to Know from Black Hat and Def Con 2019

Security Boulevard - Amazon EBS Snapshots Exposed Leaking Sensitive Data, Security Analyst Reveals at Def Con 27

The Register - Study Probes the *Other* AWS Data Exposure Trap

TechCrunch - Hundreds of Exposed Amazon Cloud Backups Found Leaking Sensitive Data

Axios - Counter-Drone Defenses

Wall Street Journal - Capital One Breach Casts Shadow Over Cloud Security

Bishop Fox Introduces New Open-Source Hacking Tool for Testing ZigBee Networks at 2019 Black Hat Arsenal

Bishop Fox Introduces New AI-Based, Open Source Pentesting Tool at 2019 Black Hat Arsenal

Bishop Fox Uncovers Security Flaws in Mass Transit Mobile Apps

Bishop Fox Researchers Discover High-Risk Vulnerability in InterSystems Application

Kevin Brooks, CPA Joins Bishop Fox as Vice President of Finance

Ars Technica - BGP Event Sends European Mobile Traffic Through China Telecom

Bishop Fox Named a "Top Company to Work for" for Sixth Year in a Row

Steve Huffman Joins Bishop Fox Board of Directors

Help Net Security - Why It’s Time to Switch From IP to DNS

The CyberWire - Daily Briefing: May 22, 2019

Daniel Wood Joins Bishop Fox as Associate Vice President of Consulting

Insec World To Be Settled In Chengdu Permanently

Bill Carroll Joins Bishop Fox as Chief Operating Officer

The Cyberwire – Daily Briefing: May 1, 2019

Bishop Fox Sponsors Summercon 2019

Ken Green Joins Bishop Fox as Vice President of Product Management

Channelomics - Bishop Fox Adds Managed Security Leader

The Cyberwire - Daily Briefing: April 18, 2019

Jon Rose Joins Bishop Fox as Vice President of Managed Security Services

Crunchbase News - Investors Are Betting Early On Cybersecurity Startups

SC Magazine - The Bug Hall of Shame

Hackaday - WOPR: Security Loses Some of Its Obscurity

Back End News - Kaspersky Lab Teams Up with Cybersecurity Pros

ForgePoint Capital Promotes Will Lin to Partner

STE - How the Media Industry Can Achieve Security Success

Hackaday - First WOPR Summit Finds the Winning Move

SqR00t - Twist & Shout: Ferris Bueller’s Guide to Abuse Domain Permutations

Pulse 2.0 - Phoenix-Based Security Testing Company Bishop Fox Secures $25 Million

Nanalyze - What is Ethical Hacking? A Look at 3 Types of Startups

Help Net Security - Bishop Fox Raises $25 Million

AiThority - Bishop Fox Raises $25 Million from ForgePoint Capital to Accelerate Growth of Security Testing Services and Expansion of Research Initiatives

Phoenix Business Journal - Tempe Cybersecurity Firm Raises $25M

InvestSize - U.S. Bishop Fox Lands $25 Mln In Series A Round From ForgePoint Capital

FinSMEs - Bishop Fox Raises $25M in Series A Funding

VatorNews - Daily Funding Roundup - February 26th, 2019

Dark Reading - Bishop Fox Raises $25 Million from ForgePoint Capital to Accelerate Growth of Security Testing Services and Expansion of Research Initiatives

CityBizList - Bishop Fox Raises $25 Million from ForgePoint Capital

Fortune - Term Sheet, February 26

PE Hub - Bishop Fox Lands $25 mln Series A

Bishop Fox Raises $25 Million From Forgepoint Capital

Hackaday - Would You Like to Play a Game? WOPR Summit Is This Weekend

Cyware - Critical Vulnerabilities Spotted in the Amtrak Mobile Application

PC Magazine - Beef Up Security and Performance With Network Segmentation

NPR - Shutdown Makes Government Websites More Vulnerable to Hackers, Experts Say

WOPR Summit - Ham Hacks: Breaking Into Software Defined Radio

Vox - Marriott's Data Breach May Be the Biggest in History

Gizmodo - Dual UPnP-Chromecast Exploit Allows Hacker to Hijack Devices

Techradar - Chromecast PewDiePie Hack Exposes Long-Standing Unpatched Bug

The Hacker News - Thousands of Google Chromecast Devices Hijacked to Promote PewDiePie

TechCrunch - Google Sat on a Chromecast Bug For Years

Intigriti - The Best Write-Ups 2018 Brought Us

Dark Reading - Bringing Compliance into the SecDevOps Process

The Wall Street Journal - Marriott's Starwood Missed Chance to Detect Huge Data Breach Years Earlier

Threatpost - Google's G Suite, Search and Analytics Taken Down in Hijacking

The Register - Google, why was your web traffic hijacked, routed through China, Russia?

The Register - Yahoo! $50m! hack! damages! bill!

University of Advancing Technology - My Path to Security

SpecterOps - Open Source Intelligence Gathering

University of Advancing Technology - How To Get A Job Panel

The Arizona Mirror - Are Arizona Elections Safe From Hackers?

Phoenix Business Journal - Cybersecurity Experts Invited to Free Conference in Mesa

Arizona Republic - Fun Kids' Events Around Phoenix in September: CactusCon Kids

Arizona Republic - Mesa Event to Focus on Computer Basics, Internet Security

Forbes - Is Your Company Ready for a Bug Bounty Program?

Wickr & Bishop Fox Report on Customer Security Promises

Threatpost - Bishop Fox on Device Threats and Layered Security

Alexa Blog - Security Best Practices for Cloud-Connected Products with Alexa Built-In

2018 Pwnie Awards - Nomination for Best Client-Side Bug

AZ Cyber Talent - Cybersecurity Internships in Arizona

CSO - Duty of Care: Why [and How] Law Firms Should Up Their Security Game

Silent Break Security - ESPKey + Long Range RFID Reader = A New Tastic Thief

Peerlyst - SearchDiggity Tool - An easy way to Search Google, Bing and Shodan

Security Boulevard - Best Practices for Using Security Groups in AWS

Threatpost - Navigating an Uncharted Future, Bug Bounty Hunters Seek Safe Harbors

Dark Reading Virtual Event - Why Cybercriminals Attack

The Daily Swig - Formula Injection Heads Server-Side

AZCentral - Top Companies to Work for in Arizona

Bishop Fox Named a "Top Company to Work" for Fifth Consecutive Year

PR Web - ioTium Partners with Bishop Fox for IIoT Infrastructure Security

Chicago Manual of Style - Brianne Hughes Talks About The Cybersecurity Style Guide

Naked Security - Half a Million Pacemakers Need a Security Patch

Threatpost - A Look Inside: Bug Bounties and Pen Testing

Computer Business Review - Heart Implants Recalled Over Hack Fears

West Valley Views - Cybersecurity Roundtable Set for EMCC

Newsweek - Internet Got Hacked This Week, At Least $150,000 in Cryptocurrency Stolen

Trustnodes - Large Scale Hack of the Internet Base Infrastructure Steals $20M Worth of Eth

The Register - AWS DNS Network Hijack Turns MyEtherWallet into ThievesEtherWallet

NBC 11 Alive News - Atlanta Billed $2.6M by Companies After $50K Ransomware Attack

TechTarget - Router Security Options Advised Following U.S. Hacker Alert

NBC 5 WPTV - Hackers are Using Drones to Commit Crimes

NBC 11 Alive - Delta Customers May Have Been Exposed to Malware Attack

Fox 4 News - Hackers Using Drones to Commit Crimes

National Center for Business Journalism - Reporter's Briefing: Explaining Cryptocurrency

Denver ABC 7 - Email Breach Shows Need to Change Passwords

The Kansas City Star - Atlanta Fell Victim to a Cyberattack. Could Kansas City Be Next?

CBS 5 West Palm Beach - Cyberattack Continues to Wreak Havoc on Atlanta

WTOC 11 - Cyber Expert: Hacking of Atlanta City Hall Likely a Crime of Opportunity

KNX Indepth Podcast - March 23, 2018

WTVM 9 - Cyber Expert: Hacking of Atlanta City Hall Likely a Crime of Opportunity

Fox 6 News - Cyber Expert: Hacking of Atlanta City Hall Likely a Crime of Opportunity

CBS 45 News - Atlanta Under Attack

Alien Vault - Infosec Language Grows Up

InHomelandSecurity.com - Hackers Take Aim at Common Medical Devices

Security Info Watch - Hackers Take Aim at Common Medical Devices

Minneapolis Star Tribune - Hackers Take Aim at Common Medical Devices

Bishop Fox Promotes Rob Ragan and Andrew Wilson to Partner

Security Asia - New Cyber Security Guide Helps Bridge the Communication Gap

Cyware - New Cyber Security Guide Helps Bridge the Communication Gap

CSO - New Cyber Security Guide Helps Bridge the Communication Gap

Sentence First - Cybersecurity Style Guide is a Useful Editing Tool

Wired - Web Semantics: The Bishop Fox Cybersecurity Style Guide

BoingBoing - A Cybersecurity Style Guide

Spiceworks - This is Really Cool - Cybersecurity Style Guide

The Parallax - Cybersecurity Style Guide Helps You Write Like a Hacker

Security Conversations - Aanchal Gupta, Director of Security at Facebook

Down the Security Rabbithole Podcast - Testing Security Into Applications

Hitech News Daily - Drones to Become New Cyberwar Weapon

MIT Technology Review - Cyberwarfare is Taking to the Skies, Aboard Drones

Cyberscoop - Drones Emerge as New Dimension in Cyberwar

Georgian Partners Podcast - Bug Bounties, Penetration Testing & More

Heimdal Security - Expert Roundup: Why Can’t Cybersecurity Be Simpler?

Digital Trends - That's Amazing! 7 Brilliant, Unorthodox Hacks

TechTarget - No Need to Rush Network Patching for Spectre and Meltdown

AZ Business Magazine - GPEC Positions Valley as Leader in Internet of Things

Phoenix Business Journal - Coming in 2018: Tech Jobs in Cybersecurity

The Arizona Republic - Tech Workers in High Demand in Metro Phoenix

A Roundtable of Hackers Dissects 'Mr. Robot' Season 3 Episode 9: 'Stage 3'

Bishop Fox Made "Mr. Robot" - Again

Phoenix Business Journal - Looking for a Tech Job?

Phoenix Business Journal - Tempe Cybersecurity Firm Expanding

3TV/CBS 5 News - Uber Hack Was Apparently the Work of Two People

Fox 10 News - Local Company Looking at Ways to Stop Bad Drones

Motherboard - A Roundtable of Hackers Dissects 'Mr. Robot' Episode 5

Motherboard - A Roundtable of Hackers Dissects 'Mr. Robot' Episode 4

SANS Core NetWars Tournament of Champions

SC Magazine - Cybersecurity Firm Builds Drone-based Attack Platform

3TV/CBS 5 News - New Drone Threat: Hacking from the Air

BadCyber - IT Security Weekend Catch Up

The Hacker News - Microsoft Issues Patches For Severe Flaws

Security Week - Hackers Can Execute Code on Windows via DNS Responses

Krebs on Security - Microsoft's October Patch Batch Fixes 62 Flaws

Security Boulevard - Critical DNS Flaw Exposes Windows Computers to Hacking

WCCF Tech - Time to Patch Your Windows Machines as Microsoft Fixes a Critical DNA Bug

iTnews - Microsoft Patches Windows DNSEC Zero-Day

ThreatPost - Microsoft Patches Office Bug Actively Being Exploited

Security Affairs - Microsoft's October Patch Tuesday Addresses Three Critical Zero-Day Security Vulnerabilities Tied to the DNSSEC Protocol

BleepingComputer - Windows DNS Bug Lets Attackers Run Code on Your Computer

Computerworld - Another Banner Patch Tuesday, With a Word Zero-Day and Several Bugs

AskWoody - Patch Tuesday Patches Are Out

Dark Reading - Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC

Threatpost - Microsoft Patches Critical Windows DNS Client Vulnerabilities

Help Net Security - Bugs in Windows DNS Client Open Millions of Users to Attack

Cyberscoop - Critical Windows DNS Vulnerability Gives Hackers the 'Keys to the Kingdom'

MarketWatch - The Big Security Hole in the Cloud

The Wall Street Journal - An Unexpected Security Problem in the Cloud

Healthcare IT News - Analysis: What's in an FDA Recall?

Threatpost - Many Questions, Few Answers For Equifax Breach Victims

Computerworld - It's Time For IT To Take Control Of Mobile Apps

CSO Online - 465,000 Pacemakers Vulnerable to Hacking Need a Firmware Fix

International Business Times - Sarahah Collects Contact For Feature That Doesn't Exist

Naked Security - Sarahah Slurps Up Contacts For Feature That Doesn't Exist

The Daily Dot - Sarahah Has Been Covertly Uploading Your Address Book to Its Servers

Threatpost - Anonymous Messaging App Sarahah to Halt Collection of User Data With Next Update

HackRead - Sarahah App Uploads Your Contacts List on Unidentified Server

WCCF Tech - Viral "Honesty App" Sarahah Discovered Stealing User Data

The Intercept - Hit App Sarahah Quietly Uploads Your Address Book

Fortune - Sarahah Has Been Downloading All the Data in Your Address Book

TechCrunch - Can the Security Community Grow Up?

Help Net Security - Weaponizing Machine Learning to Improve Cyber Defenses

Forbes - Head In The Clouds: What To Ask Your Engineering Team About AWS Security

Neowin - Black Hat: Shooting Down Drones in the Wild

Wired - Watch a Test of Anti-Drone Weapons, From Shotguns to Superdrones

eWeek - Defending Against Drone Incursions Isn't Easy, Black Hat Session Reveals

Teslanomics Live - Tastic RFID Thief Mention

CNBC - Cardless ATMs Are Cool, But You Still May Get Ripped Off

Forbes - Why You Need To Worry About Wire Fraud

Forbes - How To Build A Security Program In Three Months

Bishop Fox Ranked Among "Top Companies to Work for in Arizona"

HackerOne - Zero Daily for June 26, 2017

Dark Reading - How End-User Devices Get Hacked: 8 Easy Ways

ToolsWatch - The Black Hat Arsenal USA 2017 Phenomenal Line-Up Announced

Forbes - How to Plan for Security Incident Response

Dark Reading - Understanding Cyber Attackers and Cyber Threats

Bishop Fox Finds 98% of the Top Million Internet Domains Vulnerable to Email Spoofing

Forbes - What You Need to Know About Cybersecurity and the Internet of Things

Forbes - What You Need to Know Now About Cybersecurity and Social Media

Forbes - How Shifting Government Policies Affect Your Company's Cybersecurity Program

Dark Reading - 10 Questions to Get Practical Answers at Interop ITX

Bishop Fox Tests Best Known Virtual Private Networks (VPNs) for Privacy, Performance and Ease of Use

Tech Emergence - Machine Learning in Gaming

Forbes - How to Use Red Teaming in Your Cybersecurity Program

ZDNet - Automating Security? Robots Can't Replace Humans in Decision Loop

Dark Reading - 'PetrWrap' Signals Intensified Rivalry in Ransomware Gangs

Forbes - The Top 5 Security Functions to Outsource

Bishop Fox Partner Christie Terrill to Present at Dark Reading Webinar and Conference

CNET - CIA Hacking? Hooray! Privacy Advocates See an Upside

Dark Reading - Building a Cybersecurity Architecture to Combat Today's Risks

Forbes - Everything You Need to Know About IT Asset Management

New Scientist - AI Beats Professional Players at Super Smash Bros. Video Game

The Information - Apple Severed Ties with Server Supplier After Security Concern

82nd Annual Kentucky Society of Professional Engineers Convention - Highway to the Danger Drone

High Scalability - Scalability News For February 17, 2017

Forbes - How To Build A Cybersecurity Strategy for 2017

Security Linkspam - February 1, 2017

Forbes - 4 Ways to Build A CISO Role In Your Company

SC Magazine - Measuring Your Incident Response Program

BadCyber - IT Security Weekend Catch Up

Naked Security - St. Jude Case Highlights Ongoing Divide Over ‘Responsible Bugs Disclosure’

Christian Science Monitor - A Flawed Medical Device, A Troubling Response

Forbes - How to Tell When Your Company Should Hire a CISO

ZDNet - St. Jude Medical Releases Security Patches

Computerworld - Stock-Tanking in St. Jude Medical Security Disclosure Might Have Legs

TechWorld - Stock-Tanking in St. Jude Medical Security Disclosure Might Have Legs

CSO - Stock-Tanking in St. Jude Medical Security Disclosure Might Have Legs

ThreatPost - St. Jude Medical Patches Vulnerable Cardiac Devices

CIO - Stock-Tanking in St. Jude Medical Security Disclosure Might Have Legs

FDA - Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices

WiredTree - December 2016's Best Design, CMS, and Security Content

Forbes - Three Ways to Defend Against Ransomware

Fortune - Here's How the Galactic Empire Fails at Cybersecurity in 'Star Wars'

Forbes - Tips for Talking to Your Board About Security Incidents

The Register - Hackers' Modular Worm Builder Hoses Popular Team Web Chat Apps

Danger Drone UK - Hacker's Delight - Danger Drone Article - Oct. 2016 Print Issue

2017 AZ Business Leaders - Vincent Liu Profile

Lifehacker - Mr. Robot's Mobile Hacking Go Bag

Statement from Bishop Fox on Muddy Waters and MedSec Response to St. Jude Medical Lawsuit

Dark Reading - Re-Thinking Your Enterprise IT Security Strategy

IoT World News - Hackers Prove the Smart Home Is Not a Safe Home

Better Cloud - Creating a Security Blueprint: A Realistic Approach Using the CIS 20

CSO - Thousands of Internet-Connected Devices are a Security Disaster in the Making

eWeek - Hacking RFID Tags is Easier Than You Think: Black Hat

The Meta - Melee’s ‘John Henry Moment’ May Have Already Passed

The Times - Communist State Funded CCTV Company Has Eyes Across the Globe

Dark Reading - Choosing the Right Data Encryption Strategy

Reactions - Airborne Hacking Takes Off

The Christian Science Monitor - What Can the Flying PowerEgg Do That Other Drones Can't?

DroneLife.com - Cybersecurity Firm Unleashes Tiny Hacking Drone

Hack A Day - Creating Unbeatable Videogame AI

ZDNet - These Were the Best Hacks at Black Hat and DEF CON This Year

McAfee Blog Central - This Year at Black Hat: Danger Drones and Thermostat Ransomware

International Business Times - Top 5 Scary Hacks That Emerged From Black Hat USA

FossBytes - 5 Best Hacks From The Black Hat 2016

Christian Science Monitor - Drone Invasion Offers Solutions

Help Net Security - Black Hat USA 2016 Arsenal Photo Gallery

USA Today - Solar Panels, Vacation Wi-Fi at Risk for Hacking

MSN News - Danger Drone: The $500 Hacker Laptop That Takes Flight

Politico - Morning Cybersecurity Briefing

Digital Trends - Meet Danger Drone - A Flying Computer Designed to Hack Into All Your Unprotected Devices

Yahoo Tech - Meet Danger Drone - A Flying Computer Designed to Hack Into All Your Unprotected Devices

Financial Times - Cyber Experts Warn of Hacking Capability of Drones

Security Affairs - Danger Drone, the Flying Hacking Machine Devised By a Cyber Security Duo

International Business Times - Danger Drone: The $500 Hacker Laptop That Takes Flight

Popular Science - Researchers Put a Tiny Computer on a Drone

TechWorm - Hacking Laptop Costs $500 and Flies to Hack the Target

High Frequency Security Bug Hunting: 120 Days, 120 Bugs

Motherboard - The 'Danger Drone' Is a $500 Flying Hacker Laptop

eWeek - Danger Drone Penetration Testing Device to Take Flight at Black Hat

Forbes - I Got Annihilated By An 'Unbeatable' AI 'Smash Bros.' Player

Lifehacker - Build Your Own Mini NES With a Raspberry Pi and This Printed 3D Case

Rolling Stone - 'Mr. Robot': Four of the Show's Best Hacks, Explained

The Globe and Mail - Five Hacks From Mr. Robot and How They Work

Regular Geek - Geek Reading June 17, 2016 #1130

Bishop Fox Named "Top Company to Work" for Third Year in a Row

Sprint Business - 5 Steps to Protect Yourself Against 'Google Dorking'

The Register - Bug Bounty Blitzers Open-Source Sick Subdomain-Spotter

Forbes - Security News You Might Have Missed

Down the Security Rabbithole Podcast - Newscast for April 12th, 2016

ThreatPost - Inside the Latest Apple iMessage Bug

The Intercept - Apple Bug Exposed Chat History With a Single Click

SANS Internet Storm Center - ISC StormCast

Help Net Security - Bug in OS X Messages Client Exposes Messages, Attachments

Ubergizmo - Apple Patches OS X Bug That Can Leak Your iMessages

Tom's Guide - Malicious Link Steals Every iMessage on Your Mac

Softpedia - Bug in OS X Messages App Lets Attackers Steal Your Chat History

Digital Trends - Apple Just Fixed an iMessage Bug That Researchers Called Easily Exploitable

Engadget - OS X Update Fixed 'Simple' Bug That Could Leak Your iMessages

Bishop Fox Researchers Discover Vulnerability in OS X Messages Application

iDigitalTimes - iMessage Vulnerability Fixed By Apple

The Verge - iMessage Bug Exposed Target's Chat History After One Click

Business Insider - Something Called 'Google Dorking' Helps Hackers Find Out Stuff

CNET - A Hacker's Next Target Is Just a Web Search Away

BetterCloud Blog - How to Recognize and Prevent Social Engineering Attacks

NPR - At Calif. Campuses, A Test For Free Speech, Privacy And Cybersecurity

Building a Life and Career in Security Podcast - Kevin Chung

BetterCloud - How to Recognize and Prevent Social Engineering Attacks

NPR - Apple To Fight Court Order To Break Into San Bernardino Shooter's iPhone

Hackread - 10 Famous Bug Bounty Hunters of All Time

CNBC - Want Job Security? Try Cybersecurity

InfoWorld - ISO 27018 Compliance: Here's What You Need to Know

Forbes - Should You Plug That USB Drive Into Your Computer?

Gustavus Adolphus College Blog: Studying English Leads to World of Technology

ITAC 2015 – CloudBots – Abusing Free Cloud Services to Build Botnets in the Cloud

HowStuffWorks - How Computer Forensics Works

Engadget - The Many (Surprisingly Realistic) Hacks of 'Mr. Robot'

Wired - A Peek Inside Mr. Robot’s Toolbox

InfoSec Institute - Fifteen Famous Bug Bounty Hunters

eSecurity Planet - RFID Susceptible to Cloning, Other Hacks

Computer World - 10 Scary Hacks From Black Hat and DEF CON

Yahoo News - Heists Go Hollywood With DEF CON Hacks

The Globe and Mail - Tech Security Improvements We Need

Windows IT Pro - Security Sense: If You Program It, They Will Break It

eWeek - Seven Highly Anticipated Talks at Black Hat, DEF CON Events

CIO - The Upload

Risky Business Information Security Podcast - #376: Sniper Rifles, Bank Safes and Android All Pwned

Slashdot.org - Tools Coming To DEF CON For Hacking RFID Access Doors

Computer World - No Building Access Card? No Problem If You Have New DEF CON Tools

PC Advisor - No Building Access Card? No Problem If You Have New DEF CON Tools

Tech World - No Building Access Card? No Problem If You Have New DEF CON Tools

CIO - No Building Access Card? No Problem If You Have New DEF CON Tools

Network World - No Building Access Card? No Problem If You Have New DEF CON Tools

IT World - No Building Access Card? No Problem If You Have New Def Con Tools

PC World - No Building Access Card? No Problem If You Have New DEF CON Tools

Good Gear Guide - No Building Access Card? No Problem If You Have New DEF CON Tools

The Register - Are Smart Safes Secure? Not After We've USB'd Them, Say Infosec Bods

Christian Science Monitor - Researchers: We Can Crack a Smart Safe in Less Than 60 Seconds

Wired - Brinks’ Super-Secure Smart Safes: Not So Secure

Yahoo News - Researchers: We Can Crack a Smart Safe in Less Than 60 Seconds

Slashdot.org - Hacker Set To Demonstrate 60 Second Brinks Safe Hack At DEFCON

Boing Boing - Brink's Computerized Safe Was Hacked in 1 Minute

BGR - Brinks Safe Hacked With USB Stick and 100 Lines of Code

TechWorm - Researcher Hacks Brinks Ultrasafe ‘Safe’ Using USB and 100 Lines of Code

The Next Web - Brinks Has a Safe That Runs Windows XP and Hackers Say They Can Crack It In 60 Seconds

PC World - Brinks Safe Can Be Hacked With Just a USB Stick

Network World - Brinks Safe -- With a USB Port -- Proves Easy Hacking for Security Researchers

eWeek - DEFCON Hackers Tell How They Cracked Brinks Safe in 60 Seconds

Good Gear Guide - Brinks Safe Can Be Hacked With Just a USB Stick

Top Tech News - Brinks Safe Can Be Hacked in 60 Seconds With Just a USB Stick

Bishop Fox's Tastic RFID Thief Spotted in "Mr. Robot"

Future Crimes

Digital Guardian - The Top 10 Moments in Black Hat History

BBC.com - Can We Trust the Internet of Things to Protect Us?

Dwell - Meet the Good Guys Trying to Hack Your Smart Home

Bishop Fox Named "Top Company To Work" Second Year In A Row

Bishop Fox Researcher Discovers LastPass Vulnerability

3TV News - Valley Man Creates Website to Test Online Retailers' Security

eWeek - IRS Reveals Data Breach, 100,000 Taxpayer Accounts Accessed

Dark Reading Blog - Social Engineering Defenses: Reducing The Human Element

SecurityWeek - Social Engineering: Attackers' Reliable Weapon

CSO - A Post-RSA Conference Recap

Help Net Security - Successful POS Attacks Are The Result of Poor Security, Researchers Find

Daily Mail - Millions at Risk of Hacking Fraud After It's Revealed Major Credit Card Machine Company Has Used the Same Default Password Since 1990

RT - Poor Password Management Put Millions of Cash Registers at Risk for Decades

SC Magazine UK - Point-of-Sale System Security is Lacking

The Register - Cash Register Maker Used Same Password Since 1990

Slashdot.org- POS Vendor Uses Same Password Non-Stop Since 1990

Atlanta Tech Village - Security Compensation - How to Invest In Startup Security

SC Magazine - AirDroid Vulnerability Would Let Attackers Take Over Android Phones

CSO - AirDroid App Fixes Severe Authentication Vulnerability

ITWorld - AirDroid App Fixes Severe Authentication Vulnerability

Network World - AirDroid App Fixes Severe Authentication Vulnerability

Reseller News - AirDroid App Fixes Severe Authentication Vulnerability

PC World - AirDroid Fixes Flaw That Could Grant Hackers Full Control of Your Phone

SecurityWeek - Popular AirDroid App Vulnerable to Authentication Flaw: Researchers

ThreatPost - AirDroid Patches Web App Hijacking Vulnerability

Bishop Fox Discovers Major Authentication Bug in Popular AirDroid App

TechTarget - Is Your Web Conferencing Service As Secure As You Think?

Marketplace - Is the NSA Monitoring Foreign Hard Drives?

Newsweek - Russian Researchers Expose Breakthrough in U.S. Spying Program

Tech Times - Meet Equation Group, The Most Advanced Hacking Group: Here's What They Can Do And Here Are Their Victims

Daily Mail UK - Russian Researchers Expose 'NSA's Secret Weapon': Outrage at Program that Enables America to Spy on EVERY Home Computer in the World is Uncovered

Business Insider - HUGE SPY PROGRAM EXPOSED: NSA Has Hidden Software in Hard Drives Around the World

Reuters - Russian Researchers Expose Breakthrough in U.S. Spying Program

Yahoo News - Russian Researchers Expose Breakthrough in U.S. Spying Program

re/code - NSA Can Hide Spyware in Hard-Disk Firmware

News – Russian Researchers Expose Breakthrough U.S. Spying Program

CBC News - NSA Hid Spying Software in Hard Drive Firmware, Report Says

ValueWalk - NSA Has Developed Super Malware According To Kaspersky

Financial Post - NSA is Infecting Hard Drives with Difficult to Detect Spying Software, Report Says

The Daily Caller - Spyware Linked To NSA Discovered In Hard Drives Across The World

CNET - NSA Planted Surveillance Software on Hard Drives, Report Says

New York Daily News - NSA Program is Embedding Secret Spying Software in Hard Drives

The Huffington Post - NSA Has Ability To Hide Spying Software Deep Within Hard Drives: Cyber Researchers

Reuters - Russian Researchers Expose Breakthrough U.S. Spying Program

Bishop Fox’s Tastic RFID Thief Featured in "Silent Hack Attacks"

AZCentral – Phoenix Aims to Become “Cyber Security Valley”

Geek.com – The Pitendo is One Awesome Little NES Emulator

eWeek – Bebe Joins Long List of Hacked Retailers

ABC 15 – 6 Cyber Monday Tips to Keep You Safe While Online Shopping

Fox 10 News – Use Caution When Shopping on Cyber Monday

Dark Reading – 10 Ways Security Gurus Give Thanks

Information Week – Is Security Awareness Training Really Worth It?

ABC15 - Valley Hacker Gives Advice On How To Look For Fraud

Dark Reading University - Protecting Back-End Systems

Dark Reading University - Monitoring Threats and Measuring Risk

Dark Reading University - Protecting the Customer-Facing Website

eWeek - Tyupkin Malware Takes Aim at ATMs

OWASP - Testing Guide 4.0

eWeek - Feds Threatened Yahoo With $250K-a-Day Fine Over User Data

NPR - Apple Pay Wants To Be Your Mobile Wallet

Fox 10 News - Securing Your Photos & Emails: Tips To Keep Your Private Information Safe

Dark Reading Radio - The Best of the Rest of Black Hat: The Best for Last?

ToolsWatch - Black Hat Arsenal USA 2014 – Wrap up Day 2

ToolsWatch - Black Hat Arsenal USA 2014 – Wrap up Day 1

SecurityWeek - JPMorgan Targeted in Alleged Russian Cyberattack

Help Net Security - DHS Urges Website Admins to Minimize Risk of Google Hacking

eWeek - Feds Investigating Potential JPMorgan Chase Hacking Attack

Ars Technica - Feds Warn First Responders of Dangerous Hacking Tool: Google Search

Computerworld - Feds Issue Bulletin Warning About Malicious 'Google Dorking' Cyber Actors

eWeek - Chinese Hackers Breach 4.5 Million Health Care Records

Darknet – Hiding Bitcoin Mining In The Cloud

Dark Reading – CloudBot: A Free, Malwareless Alternative to Traditional Botnets

IEEE Spectrum - Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency

SDN Central - Black Hat Session Shows How to Build a Cloud Botnet for Free

Deep.Dot.Web - Mining Cryptocurrency With A Free Cloud Botnet, Why Not?

Fox News - Evil USBs to Bitcoin Botnets: Hackers Hit Vegas

eWeek - Rickrolling a Google Chromecast at Black Hat

eWeek - How to Prevent Automated Cloud Fraud: Black Hat

PC Mag - Creating a Bitcoin-Mining Botnet at No Cost

PC Mag – Eight Terrifying Things To See at Black Hat 2014

Dark Reading - Dark Reading Plans Special Coverage Of Black Hat USA 2014

Bishop Fox to Present at Black Hat 2014 and Security B-Sides in Las Vegas

Hack A Day – Hacking Chromecast With The Rickmote Controller

Gigaom – Chromecast’s Easy Setup Makes It Susceptible to Hacking

Lifehacker After Hours – Make a Chromecast-Hijacking Rickrolling Device Out of a Raspberry Pi

The Travel Insider - Scottevest RFID Blocking 26 Pocket Travel Vest

Naked Security - "Rickmote" Box Rickrolls Chromecast

Metro.co.uk - Someone Has Invented a Device Which Allows You to 'Rickroll' Your Neighbours' TV

Mashable - Chromecast Hack Lets You Rickroll Your Neighbor's TV

ReadWrite - How Raspberry Pi Can Hijack Chromecasts

Business Insider - This Gadget Can Hijack Any Google Chromecast, And It's Actually A Pretty Serious Issue

The Daily Dot - It's Incredibly Easy to Hijack a Google Chromecast

c|net - Tomorrow Daily 021

Engadget - Pranksters Can Hijack Your Chromecast to Show Whatever They Want

SlashDot- The “Rickmote Controller” Can Hijack Any Google Chromecast

Wall St. Cheat Sheet - 5 Gadgets From This Week: Rick Roll Makes a Chromecast Comeback

The Guardian - How to Rickroll Any TV Using Chromecast Flaw

Gizmodo - "Rickmote" Chromecast Hack Brings Unauthorised Astley to Wired TVs

International Digital Times - New Google Chromecast Hack Takes Rickrolling To A Whole 'Nother Level

We Live Security - Wi-Fi Security Alert on Chromecast as ‘Rickmote’ Hijacks Nearby Boxes

PC World - Rick-rolling 'Rickmote' Shows No Mercy When It Finds Someone Using Chromecast

PC Advisor - Rick-rolling 'Rickmote' Shows No Mercy When It Finds Someone Using Chromecast

SlashGear – Rickmote Controller Rickrolls All Nearby Chromecasts

Digital Trends – This Glitch Lets You Rickroll Any TV Armed With A Chromecast

Tech Hive - Rick-rolling 'Rickmote' Shows No Mercy When It Finds Someone Using Chromecast

The Register – Chromecast Hack Rickrolls Google’s TV Stick

Good Gear Guide - The ‘Rickmote’ Shows No Mercy When It Finds Someone Using Chromecast

NetworkWorld.com - The 'Rickmote' Shows No Mercy When It Finds someone Using Chromecast

Reseller News - The ‘Rickmote’ Shows No Mercy When It Finds Someone Using Chromecast

WonderHowTo – Rickroll Warning: This Exploit Can Hijack Any Nearby Chromecast

Tech Radar – Devastating Chromecast Hack Will Let You Rickroll Your Neighbors

Linebaugh Library Techblog – Rickmote: Rickrolling Chromecast Users

Tom’s Guide – Hacker Gadget Hijacks Google Chromecast, Rickrolls TVs

Tech Digest – Chromecast Bug Enables Rickrolling

Raspberry Pi Foundation – Rickmote: Rickrolling Chromecast Users

Wired- Rickroll Innocent Televisions With This Google Chromecast Hack

CIO – The ‘Rickmote’ Shows No Mercy When It Finds Someone Using Chromecast

TechRepublic – The Scary Truth About Data Security With Wearables

CSO – Ideas For Defending Against Cyberespionage

Dark Reading – Slideshow: Hacker Movies We Love & Hate

AZ Tech Beat - CareerBuilder 2014 List - Top Places to Work in AZ

IT Security Firm, Bishop Fox, Is One Of The Top Companies To Work For In Arizona

The Hacker Playbook: Practical Guide to Penetration Testing

CSO - 10 Ways To Avoid Having Your Cloud-Hosted Business Destroyed By Hackers

eWeek - Daily Tech Brief: June 18th, 2014

eWeek - AT&T Insider Data Breach More Dangerous Than External Hacking

CIO - How Apple iOS 8 Eases Some Privacy Concerns

Dark Reading – Black Hat USA 2014: AppSec Grab Bag

Dark Reading - Black Hat USA 2014: Appsec Grab Bag

Cruxial CIO - Mobile Security’s Weakest Link? Your Employees

CSO - How To Avoid Cyberspies On Facebook, LinkedIn

MakerBot Thingiverse - Bishop Fox Edition Of The NinTastic - A Nintendo-Style Case For The Raspberry Pi

Fortune - No, Anti-Virus Software Isn't Dead (Yet)

ToolsWatch.org - Tastic RFID Thief – Proximity Badge Released

Fox 10 Phoenix News – Your Digital Shadow, A Viral Marketing Campaign Exposes Your Digital Life

BYU - CS Student Wins Second Annual BYU Hacking Contest

CSO – Countering Security Threats Outlined in Latest Microsoft Report

CSO – Tech Titan Funding Just a Start in Securing Critical Open-Source Projects

MakerBot Thingiverse – Bishop Fox – 3D Logo and Symbol

MarketWatch - Heartbleed: Why Companies are Clueless About Security

Network Computing – Network Vendors Issue Heartbleed Fixes

Dark Reading - Flash Poll: Broken Heartbeat

DarkReading Blog- Heartbleed: Examining The Impact

eWeek - Grand Theft Auto V Can Cause Malware Infection On PCs

eSecurity Planet – Can Cloud Services Be Exploited To Aid Attackers?

Dark Reading - Researchers Create Legal Botnet Abusing Free Cloud Service Offers

Computerworld - Enterprises Advised to Exercise Care in Using Apple Products

Fox 10 Phoenix News – White Hat Hacker Interview

Dark Reading - Abusing Cloud Services For Cybercrime

CSO – Experts Question Security Used In Target Breach

Phoenix Business Journal – Cyber Security Experts Face Big Challenges In Wake Of Target Breach

Bishop Fox To Demonstrate Large-Scale Attacks At RSA Conference

CSO- IT Innovation Challenging Security Pros’ Knowledge

Slashdot.org- LinkedIn Ditches Feature That Was a ‘Dream for Attackers’

TIME – LinkedIn Is Killing Intro, Its Useful, Controversial iPhone Service

VentureBeat- LinkedIn Aims To ‘Focus’ By Killing Creepy LinkedIn Intro Service

TechWorld- LinkedIn Introduces, Quickly Says Goodbye To Email Service That Sparked Security Concerns

The Verge – LinkedIn Kills Its Intro Email Service After Less Than Four Months

Christian Science Monitor - Just how much spying are the Russians doing?

PC Advisory - Experts Warn of Russian Spying, Hackers At Sochi Olympics

Christian Science Monitor - The Other Security Concern at Sochi Olympics: Cyberthreats

Cruxial CIO – Sochi Olympics Wary of Hackers

CSO – Experts Warn of Russian Spying, Hackers At Sochi Olympics

ShackF00- Search Engines for OSINT and Recon

USA Today - Obama Seeks to Balance Privacy, National Security

CSO - Snapchat Falters on Security Again, Experts Say

Marshfieldnewsherald.com - Obama Seeks to Balance Privacy, National Security

CSO – NSA Hacking Tools Will Find Their Way To Criminals Eventually

CSO – Security Industry Tainted In Latest RSA Revelations

ToolsWatch – 2013 Top Security Tools As Voted By ToolsWatch.org Readers

DarkReading – Target Confirms Massive Breach Affects 40 Million Customers

eWeek – US National Security Agency Is Using Google Cookies To Track People

SearchSecurity - HP Said Mobile Application Security Comes Up Wanting

eWEEK - Bitcoins Come Under Attack As Their Value Rises

eWeek – Do you Need RFID Protection For Your Real Wallet?

SearchSecurity - FireEye Report Points To Growing Significance Of In-Memory Attacks

Experts Applaud Google Completion Of SSL Certificate Upgrade

Hack-a-Day - RFID Reader Snoops Cards from 3 Feet Away

InfoWorld - LinkedIn's Intro Tool For iPhones Could Be A Juicy Target For Attackers

DarkReading - Researchers Flag Security Flaws In New LinkedIn Offering

Gizmodo - Report: LinkedIn's New Mobile App Is A Hacker's Heaven

The Times Of India - LinkedIn's New App Called A Dream For Hackers

NY Times – LinkedIn’s New Mobile App Called ‘a Dream for Attackers’

ThreatPost - LinkedIn Intro App Equivalent to Man in the Middle Attack, Experts

KQED - Use LinkedIn? Its New Email App Raises Privacy Concerns

Marketplace – 1-800-Hackers: Why Cyber Crime Is No Longer A Dark Art

Dark Reading - Pen Testing: Making Passion A Priority

Aljazeera America – Tech Debate: Can Companies Hack Back?

eWeek - Google Encrypts to Evade NSA Surveillance: Should You?

USA Today - Analysis: Whom Can You Now Trust In Tech?

PRWeb - Cloud Hacking and Malware Analysis - Council's Hacker Halted USA

The Dr. Katherine Albrecht Show - Radio Interview of Fran Brown about RFID Hacking - 22Aug2013

Huffington Post - 10 Sci-Fi Hacks That Are Now A Reality

Slashdot.org - Ask Slashdot: Favorite Thing Out of This Year's Black Hat? - 01Aug2013

TechHive – Hacker Symposium Showcases Unsettling Simple Ways To Bypass Home Security Systems

SC Magazine - Black Hat: Researchers Explain How To Disable Home Security Systems

eWeek – Hacking RFID Tags Is Easier Than You Think: Black Hat

Network Computing – 9 Technologies Security Researchers Will Break At Black Hat

NBC News – Hackers Could Clone Your Office Key Card…From Your Pocket

Network World – Hacking And Attacking Automated Homes

Symantec - RFID Information Can Be Stolen from Three Feet Away - 24July2013

Slashdot.org - Long Range RFID Hacking Tool To Be Released At Black Hat - 24July2013

ThreatPost.com – Long-Range RFID Hacking Tool To Be Released At Black Hat

DarkReading.com – Getting Physical At Black Hat

Bishop Fox Reveals Vulnerabilities in Home, Office, and Building Security Systems

IT Business Net – Bishop Fox to Reveal Major Vulnerabilities in Home, Office, and Building Security Systems at Black Hat Las Vegas & DEF CON

Help Net Security – Major Vulnerabilities In Office Security and RFID Systems

AZ Central – How Arizona Can Dominate The Cybersecurity Industry

Information Week In Conjunction With Dark Reading – Below The Application: The High Risk Of Low-Level Threats

2600 Magazine - The Hacker Quarterly Summer 2013 - 01July2013

Dark Reading - Black Hat USA - T-Minus One Month And Counting - 25Jun2013

Dark Reading – Analyzing Vulnerabilities in Business-Critical Applications

CRN – Growing Security Firm Takes On Batman, Sneakers Personas

eSecurity Planet – 4 Ways to Secure an Apple Mac Browser

DarkReading.com – What To Ask Your Penetration Tester

DarkReading.com – Security Consultancy Stach & Liu Changes Name to Bishop Fox, Broadens Services Scope

PRWeb – Stach & Liu Re-Launches as Bishop Fox

DarkReading.com – Building An Effective Security Architecture: No Piece Of Cake

eSecurity Planet - Google's New Disclosure Policy: Helpful, or Who Cares?

TechNews World – IE8 Exploit Had US Nuke Workers in Its Sights

Dark Reading – Developing Data Classification For Stronger Database Security

TechTarget – Keeping Up With Virtualization And Mobile Technology Security

DarkReading.com - Too Scared To Scan

Main St. – Is It Actually Safter to Bank on Your Smartphone

ThreatPost.com - Why Watering Hole Attacks Work

DarkReading.com - Security-Bug Rating System Gets A Makeover

DarkReading.com - Better Patching Priority - 11Mar2013

DarkReading.com - Businesses Feel Impact Of IT Security Skill Shortage, Study Finds

PRWeb - Bishop Fox Partner Fran Brown to Discuss Security Awareness Issues at RSA 2013

AZFamily.com - Several Sprouts Stores in Arizona Suffer Security Breach

USA Today – Thieves, Spies move to AVTs: Advanced Volatile Threats – Aug. 3, 2012

DarkReading - Virtual Event - Methods for Detecting and Remediating Zero-Day Malware

SecurityWeek.com - Silly Kiddie, Exploits Are For Free

Point2Security - A Primer for Securing the Startup

Dark Reading - Tech Insight: Better Defense Through Open Source Intelligence

Hacker Halted USA - Speaker Panel-How to Make End Users Smarter About Security-29 Oct 2012

PRWeb - 4th Annual Hacker Halted USA - Top Speakers, New Exploits, Hacker Training and Global CyberLympics Championship

The ISSA Journal - SearchDiggity: Dig Before They Do

ToolsWatch.org - Blackhat USA 2012: Interview with Stach & Liu Team about Google Diggity Project

SecurityWeek.com - "Search Diggity" Project Brings Informative and Creative Hacking Tools

News10.com – NotInMyBackyardDiggity

Business Insider - NotInMyBackyard Tool Shows Who's Eyeing Your Data Online

The Last Watch Dog - Dropbox breach leads to spam attack against storage service’s users

USA Today - NotInMyBackYard tool scours Web for your personal data

SearchSecurity - Securing SharePoint: SharePoint security best practices

Dark Reading - Researchers To Launch New Tools For Search Engine Hacking

PRWeb - Bishop Fox Researchers to Unveil New Search Engine-Based Tools for Mining Security Vulnerabilities at Upcoming DEF CON 20 Conference

InformationWeek - Using Google to Find Vulnerabilities - 05Mar2012

USA Today - Uptick in tainted ads hurts consumers, advertisers

Cambridge TV - It Takes a Hacker to Catch a Hacker - Boston Application Security Conference Part 3 - Oct 2011

Cambridge TV - How to Hack: Computer Security Experts Demonstrate Techniques Part 1 - Oct 2011

Al Jazeera World News - Vincent Liu Discusses Cyber Security

Forbes - Researchers Will Turn Google And Bing Into Web Bug Warning System

The Challenges of Automated Application Assessments in a Web 2.0 World

SANS - What Works Poster - Stach & Liu listed as a trusted vendor solution for Application Penetration Testing

Microsoft BlueHat Blog - Effective Software Security: Making the Most of Tools

SPI Dynamics Expert Articles Series - Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle

SPI Dynamics Expert Articles Series - Implementing Effective Vulnerability Remediation Strategies Within the Web Application Development Lifecycle

SPI Dynamics Expert Articles Series - Web Application Vulnerability Assessment Essentials: Your First Step to a Highly Secure Web Site - Aug2007

ISSA Journal - July 2007 - Penetration Testing: The White Hat Hacker

CSO Magazine - The Rise of Antiforensics - June 2007

CIO Magazine - How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab - May 2007

SANS Secure Programming Certification - 2007

The Business Journal of Phoenix - Even without big budget, employee theft can be stopped - Nov 2006

Journal of Digital Forensic Practice - Challenging the Presumption of Reliability

Submit a Media Request

Please get in touch with our PR Team for any press or PR related inquiries.

Email: contact@bishopfox.com


Subscribe to Updates