SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
Did you know?
Hacks Happen

Jeremiah Grossman
Founder  CTO WhiteHat Security




                                  1
First Book I Read on Website Security




                  “It is insufficient to protect ourselves
                  with laws; we need to protect ourselves
                  with mathematics. It's just not true.

                  Cryptography can't do any of that.”   :(
                                                             2
Did you know?




                3
By the End of 2008...



        17 million
      programmers
       worldwide
Writing 6,000 lines of code per year (each)



                                              4
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008

Contenu connexe

En vedette

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
Liz Allen
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
guest43929b
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
Paul Brown
 

En vedette (13)

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skills
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your House
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à Rêves
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
 
SERA Email 2.6.03
SERA Email 2.6.03SERA Email 2.6.03
SERA Email 2.6.03
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi Infotech
 
Managerial speeches
Managerial speechesManagerial speeches
Managerial speeches
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to Know
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 Campaign
 

Similaire à Hack In The Box (Dubai) 04172008

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
 

Similaire à Hack In The Box (Dubai) 04172008 (20)

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Malwares
MalwaresMalwares
Malwares
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
CYBER
CYBERCYBER
CYBER
 
News Bytes
News BytesNews Bytes
News Bytes
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotes
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Hack In The Box (Dubai) 04172008

  • 1. Did you know? Hacks Happen Jeremiah Grossman Founder CTO WhiteHat Security 1
  • 2. First Book I Read on Website Security “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. It's just not true. Cryptography can't do any of that.” :( 2
  • 4. By the End of 2008... 17 million programmers worldwide Writing 6,000 lines of code per year (each) 4