- Видео 59
- Просмотров 28 138
Independent Security Evaluators
США
Добавлен 2 май 2016
Your technology solves problems through innovation. Security is a differentiator, and it matters to your customers: unless you give them assurance, they hesitate to buy. However, building security into the design process is challenging. Finding unknown security vulnerabilities is both crucial and complex. To do these right, it requires experts who have spent years acquiring specialized skills.
When companies need to solve these problems - and achieve a competitive edge - they hire Independent Security Evaluators (ISE). We're ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and security consultants. We’ve hacked cars, phones, and medical devices and published research on all of it. From finding vulnerabilities to solving complex design problems, we’ve helped hundreds of companies including Google, Netflix, Amazon, and Microsoft. As a result, each of them achieved their mission.
When companies need to solve these problems - and achieve a competitive edge - they hire Independent Security Evaluators (ISE). We're ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and security consultants. We’ve hacked cars, phones, and medical devices and published research on all of it. From finding vulnerabilities to solving complex design problems, we’ve helped hundreds of companies including Google, Netflix, Amazon, and Microsoft. As a result, each of them achieved their mission.
Ethical Hackers vs. Vulnerability Scanners - Webinar
Join Senior Solutions Consultant Ben Schmerler and Security Analyst Joel St. John for a discussion on the pros and cons of relying on vulnerability scanners, and why manual assessments matter.
Просмотров: 60
Видео
Tech Done Different [Ep 95]: Showing Vulnerability as a Leader
Просмотров 10Год назад
Ben sits down with Wayne Haber, the Director of Engineering at GitLab. The two talk about everything from where attackers get their motivation to why showing your team your vulnerabilities is healthy for you and them. You’ll Learn: - How to make remote work most effective for you and your team - why we need to change our expectation on instant response for ourselves and our team members - How a...
Tech Done Different [Ep 94]: Security at the Intersection of Digital and Physical Devices
Просмотров 4Год назад
This week the guys sit down with Ryan Barnett, the Senior Engineering Manager at Fort Robotics. The three discuss, at the speed technology is evolving, why it’s so important to prioritize security. You’ll Learn: - The difference in security when discussing robotics and autonomous systems - How to balance physical safety and device security while ensuring proper operation in the machinery - What...
Tech Done Different [Ep 93] Big Dreams and Small Budgets
Просмотров 9Год назад
On this week’s episode Ted and Ben chat with, the CTO whisper, Kathy Keating. Kathy helps guide first time and less experienced CTOs to build the skills they can’t acquire overnight. You’ll Learn: - About some of the challenges an early stage startup might have when hiring Senior Engineer for a CTO position - Which skills these new CTOs need to learn when they hit the ground running - Why it’s ...
Tech Done Different [Ep 92] Stories From a Digital Forensics and Incident Response Specialist
Просмотров 15Год назад
Ted and Ben meet with Jana Odineca, the CTO and Founder at ORNA. The three sit down to discuss, how Jana and her team help companies after a cyber attack. Finally, she goes in depth on what companies should be doing before an attack even happens. You’ll learn: - What happens when an insider threat attacks their own company - Why a one man IT and Security department, no matter your company size,...
Tech Done Different [Ep 91] CTO Excellence
Просмотров 35Год назад
On this episode Ted sits down with Best Selling Author and Founder of 7CTO’s Etienne de Bruin. The long time friends discuss what CTOs get right and wrong in their roles. You’ll Learn: - Why Etienne felt this was the right time to publish his book - What you need to do in the first 100 days as a new CTO at a company - The different issues a new CTO may encounter vs. a CTO who is promoted within...
Tech Done Different [Ep 90] Knowing When to Pivot
Просмотров 5Год назад
This week Ben and Ted are joined by Ian Hamilton, the CTO of Signiant. The three discuss how Signiant has transformed as the tech industry evolved over the last 20 years to insure the company can pivot with the market. You’ll learn: - When you should pivot - How to get past the fear of transitioning from something that works right now to what you see being the future of your industry - How to g...
Tech Done Different [Ep 89]: Why be a Mentor
Просмотров 9Год назад
This week Ted sits down with David Tyler, the Founder and CEO of Cyber Mentor DoJo. The two discuss why it’s so important to share with others, the knowledge professionals have acquired over time. You’ll Learn: - Why mentorship is important - Why we need to build mentorship into our community - Why your mentor doesn’t always need to be in your job field - What a group mentoring can offer that’s...
Tech Done Different [Ep 88]: Thinking Like a Bad Guy
Просмотров 17Год назад
This week’s special guest is Ethan Dietrich, SIXGEN’s Founder and CEO. Ethan joins the guys to discuss what cyber security looks like from a black hat hackers point of view and how his team uses the information collected to level the playing field. You’ll Learn: - What a day looks like when thinking and acting like the bad guy - How attackers stay anonymous - How can we level the playing field ...
Tech Done Different [Ep 87]: Who are Nation-State Threats
Просмотров 3Год назад
This week Ted and Ben talk with a Cyber Warfare Specialist, Brian Contos. Brian joins our hosts to discuss how cyber threats have change in his 25 year career and how they have learn to adapt with the times. You’ll Learn: - Who owns the security responsibility in a business - Why xIoT needs to be included in a business' security plan - What does a nation-state actor look like - How do threats e...
Tech Done Different [Ep 86]: Embodying Authenticity
Просмотров 52Год назад
This week Ted and Ben are joined by Nick Hughes, the CEO of EITR Technologies. They discuss why being your authentic self, from your social media posts, to branding, to your personal interaction with clients will draw people into wanting to work with you more than buzz words ever will. You’ll Learn: - Why we need to stop branding ourselves “Thought Leaders” and instead let the world around us c...
Tech Done Different [Ep 85]: Ethical Baby Thief
Просмотров 11Год назад
This week's episode of Tech Done Different features Ben interviewing Andrew Lemon, Principal Security Engineer at Red Threat. They talk about what it means to be a "good hacker". You will learn: - Why "cut and paste" penetration tests miss the point - The mindset of learning to become an ethical hacker - What can make a security assessment fun and exciting - Why "stealing a baby" can actually b...
Tech Done Different [Ep 84]: Lean Into Your Digital Senses
Просмотров 6Год назад
This week’s episode of Tech Done Different features Debasish Biswas, CTO of Aware. Ben sits down and talks with Debasish about collaboration and how we should think about the permanent changes in the way people work for the better. You will learn: - What your “digital senses” are - How to think about securing information when it exists in many different platforms - Why we shouldn’t look as virt...
Tech Done Different [Ep 83]: Chatting with a Hacker
Просмотров 17Год назад
Matt Brown literally makes a living hacking things (and, as we learned on this episode, would probably still do it even if he had unlimited money). Join Ted and Ben in a fun interview with a hacker talking about all things hacking. You’ll learn: - What common assumption leads to many security failures - How both businesses and consumers can think about better securing their solutions - What Bui...
Tech Done Different [Ep 82]: Think about Grit
Просмотров 26Год назад
On this week's episode of Tech Done Different, Ben is joined by Cody MacDonald the CTO of IPT Global. Ben and Cody sit down to talk about why it’s never too late to reinvent yourself and your career. You'll learn: - How Cody went from a Cherry Farmer, to Geologist, to CTO of a software company - why the more something makes you uncomfortable the more you need to pursue it - How to handle the st...
Tech Done Different [Ep 81]: Scientists are Artists
Просмотров 22Год назад
Tech Done Different [Ep 81]: Scientists are Artists
Tech Done Different [ep 80]: Creativity & Innovation
Просмотров 12Год назад
Tech Done Different [ep 80]: Creativity & Innovation
Tech Done Different [ep 79]: CyberPunk Is Dead
Просмотров 20Год назад
Tech Done Different [ep 79]: CyberPunk Is Dead
Tech Done Different [ep:78] Problems Worth Solving
Просмотров 14Год назад
Tech Done Different [ep:78] Problems Worth Solving
Tech Done Different [ep:77] Be Natural, Be Yourself
Просмотров 6Год назад
Tech Done Different [ep:77] Be Natural, Be Yourself
Tech Done Different [Ep 76]: Changing Buyer Behavior
Просмотров 9Год назад
Tech Done Different [Ep 76]: Changing Buyer Behavior
Tech Done Different [Ep 75]: Analyzing Security Research
Просмотров 102 года назад
Tech Done Different [Ep 75]: Analyzing Security Research
Tech Done Different [Ep 74]: Creating a Vision Statement
Просмотров 182 года назад
Tech Done Different [Ep 74]: Creating a Vision Statement
Tech Done Different [Ep 73]: Fear Less, Not Fearless
Просмотров 342 года назад
Tech Done Different [Ep 73]: Fear Less, Not Fearless
Tech Done Different [Ep 72]: Gut and Common Sense
Просмотров 332 года назад
Tech Done Different [Ep 72]: Gut and Common Sense
Tech Done Different [Ep 71]: Adapt to Change
Просмотров 282 года назад
Tech Done Different [Ep 71]: Adapt to Change
Tech Done Different [Ep 70]: Web 3.0 Security
Просмотров 242 года назад
Tech Done Different [Ep 70]: Web 3.0 Security
Tech Done Different [Ep 69]: Why VRM Needs Customization
Просмотров 162 года назад
Tech Done Different [Ep 69]: Why VRM Needs Customization
Tech Done Different [Ep 68]: Remove Friction
Просмотров 152 года назад
Tech Done Different [Ep 68]: Remove Friction
Tech Done Different [Ep 67]: Threat Intelligence
Просмотров 1102 года назад
Tech Done Different [Ep 67]: Threat Intelligence
This guy bullied a young fan and he mistreats his employees just like mike mood
First part true second part CAP
Well several employees have said he doesn’t pay them fairly,he fires them when they want a pay rise,he is also accused of sexism and also him bullying eckrocoster was just crook. I really don’t like him or his game
I hate Zach Belanger he is as bad as mike mood
He said When the market is at its high and eth was worth $1000 he had 44 million dollars.....At todays value he has just 4 million, so he lost 40 million dollars and he laughed with smirks Ok, now after your video eth moved to be worth $4000 dollars, so he should of have 170 million dollars, so he went from 4 million to 170 million, so istead of losing 40 million with ur laughs, he just won 168 million dollars had he sold at 4000, but then crypto market got into bear state right now and do u know what ETH worth right now with its BEAR state? its $1900 lol....so he still up from that 4 million which u laughed about. This last comment alone showed me how dumb this person is.
Will the IoT village be there this year?!
Promo*SM
He just cashed out 50 mil a couple weeks ago
no
how to scan so many keys?
Make earth humanity nature wildlife environment biodiversity cities towns and 200 100% strong smart bright renewable ageless beautiful eco friendly sustainable solarpunk immortal utopian resilient peaceful safer healthier anachronistic future
Erase bad evil dystopian cyberpunk aging diseases old age mortality sickness illness death fossil fuel pollution extinction horror cruel crime futures
11:43 - backdoor????? wtf?????
𝓟Ř𝔬𝓂𝔬𝐒ϻ 💦
I love to Seth Belanger speak?
music must be louder, because you upload video for music, not for speaker
I love working at Mob Entertainment, it’s great
Omg hi mob entertainment worker also I have a small question will bron appear for a tiny bit in chapter 3
What will be about poppy playtime chapter 4
🤭 ρяσмσѕм
How to secure your terramaster NAS if you already have one?
0x7E5F4552091A69125d5DfCb7b8C2659029395Bdf🔑0x0000000000000000000000000000000000000000000000000000000000000001 0x4C636a08FDF3692A9bCa111e8a7F4A0E28Eb4457🔑0x0000000000000000000000000000000000000000000000000a00000000000000
both with zero balance
Dm me
I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt
I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt
I couldn't never had believe that I will still have access to my funds again if not for 𝑻𝒕𝒆𝒄 𝑜𝑛 𝑊𝒉𝑎𝑡𝑠𝐴𝑝𝑝 𝑐𝑜𝑛𝑡𝑎𝑐𝑡 𝒉𝑖𝑚 𝑣𝑖𝑎+1 (657) 443‑5112 _or 𝗖𝗹𝗼𝘄𝗻𝘁𝗼𝗼𝗹𝘀_ 𝗼𝗻 _¶π$𝘁𝗮𝗴𝗿𝗮𝗺_who erased my doubt
hiddentoolz on lg.. best ever on prvt keys, thanks to those who recommended them❤️🙌
*Professionalbitcoin7 on 1G remains the best on crypto currency’s problems*
*Professionalbitcoin7 on 1G remains the best on crypto currency’s problems*
Feeling good! Yeah that's me today. Tappan_nikto on Instagram just helped me got a private key for my ”non spendable” fund in my blockchain wallet.
Video titled "How We Discovered New Vulnerabilities in the ASUS RT-AC3200 Router." Presenter proceeds to say, "now in the interest of time, I'm not actually going to show you how I found both of these bugs." wtf
Could this not be just like the spam going in this comment stream now? Convince non tech people watching videos about how to get cryptocurrency or recover your lost keys. And bammm theft.
This is like true heaven for me
How you managed to run the webserver on the raspberry pi ?
Planning to buy. Thanks for the test! A small comment on the new update TOS 4.0 maybe?
That's amazing ^^ I was already prototyping some of my own furry badges. First idea was a NFC tag, RGB leds and a scrolling text screen on the bottom. The animation glasses is also an amazing idea which i would love to include ^^
He’s best at it, *cyberbeast10 on iG*
All Thanks to Raytools on >>¦¦nstaGram Unlocked my non-spendable btc back to spendable
⚡⚡ *Boney2705 on !G* changed my life, I got 15BTC from him , forever grateful ☑️☑️☑️☑️
"May have fleas" ...sigh... Interesting stuff so far
The keyspace is 2^256, but the address space is 2^160 (an Ethereum address is obtained from the least significant 160-bit of the Keccak-256 hash). So theoretically a single address can have up to 2^96 private keys. And what could happen if we combine the birthday paradox with ethereum private key collisons? ;)
Is this true? You could collide with an address but the blockchain still exposes the public keys given a signature and the message (transaction) it signed.
@@peterwillemsen9516 never
Good job, I mentioned this in my latest video.
what did lenovo say about these vulnerabilities?
Read about these vulns on this blog here: blog.securityevaluators.com/new-vulnerabilities-found-in-lenovo-ix4-300d-28f545f5c86e
Okay so how did you extract the source code from the router in the first place?
You can email Asus and ask for it, and they should be legally obligated to provide it because it’s licensed under the GPL.
Super clear explanations. Love this guy. Thanks so much to him and ISE!
Probably the only channel with new real exploits.
They made an firm ware for that router for this mouth Dec build .
Can always have it open and you can add the MAC address to your computer to the router and just have the rider locked up and you wouldn't have access to it and then only that computer would go on to the router and then you couldn't have remote access anyways
Turn the the PIN code off also change the wifi code password to an very long wifi code . lomger the better it is . Sucks tiping it in . You can copy and past it in from an usb stick .
Okay they're pretty much saying that you can't do it over the Wi-Fi and you have to physically be at the device so you have put it in the closet or you put it somewhere where you can lock it up keep it away from people like you
Huge question why did you not put the antennas on it
Great job debugging! Thanks again for all the hardwork!
Amazing demonstration, learned more in this video that in hours in book about pentesting, I would like to follow this guy, where can I find this people out
Hope you were able to find us on twitter and on our blog. If not make sure to look at Rick's blogs here blog.securityevaluators.com and find Rick on twitter here twitter.com/rramgattie
This series is fucking awesome. Thank you so much.
We still got a couple more to go. I am glad to hear you are enjoying them!
Am I the only one that saw the backdoor command?
I was like: "Did i see backdoor somewhere?"