POPULARITY
Bouncing Back: The Personal Resilience Science Insights Podcast
Navigating binge eating and body image is a journey fraught with challenges and complexities, touching upon both psychological and societal factors. On today's episode, we're delving into the depths of understanding and overcoming binge eating and body image struggles. Joining us is the remarkable Dr. Alissa Knight, a powerhouse in mental health, bringing her expertise as a Clinical Psychologist, Researcher, and Founder of The Calming Suite in Adelaide, South Australia. Get ready for an enlightening conversation that will challenge perceptions and inspire growth! Dr. Alissa and Joahanna unveil the intricacies of binge eating, shedding light on the crucial distinctions between occasional overeating and binge eating disorder. Dr. Alissa emphasizes the importance of understanding and awareness, countering societal misconceptions with practical strategies for managing and preventing binge eating episodes. From fostering a positive relationship with one's body to embracing mindfulness techniques, Dr. Alissa offers a holistic approach to self-care and self-acceptance. Together, we explore the imperative of promoting body positivity and inclusivity across various industries, navigating societal pressures with resilience and grace. Embracing authenticity and self-acceptance empowers individuals to reject unrealistic ideals and embrace their unique beauty, fostering resilience in the face of societal pressures. Tune in for a transformative journey towards reclaiming personal power and fostering inner strength! Follow Dr. Alissa's work at https://www.thecalmingsuite.com.au/ or connect with her on social media: Instagram: https://www.instagram.com/australianpsychologistalissa/ Facebook: https://www.facebook.com/p/The-Calming-Suite-Psychology-Dr-Alissa-Knight-100083018730344/ LinkedIn: www.linkedin.com/in/dr-alissa-knight-484708238 Produced by the Personal Resilience Science Labs, a division of LMSL, the Life Management Science Labs. Explore LMSL at https://lifemanagementsciencelabs.com/ and visit http://pr.lmsl.net/ for additional information about Personal Resilience Science Labs. Follow us on Social Media to stay updated: YouTube: https://www.youtube.com/channel/UCv1pZy9W9aew6CUK12OeSSQ Facebook: https://www.facebook.com/personal.resilience.science.labs Instagram: https://www.instagram.com/resilience.science.labs/ LinkedIn: https://www.linkedin.com/showcase/personal-resilience-science-labs/ Twitter: https://twitter.com/PRScienceLabs TikTok: https://www.tiktok.com/@resilience.science.labs Pinterest: https://www.pinterest.com/resiliencesciencelabs/ You can also subscribe and listen to the show on your preferred podcasting platforms: Apple Podcasts: https://podcasts.apple.com/us/podcast/bouncing-back-the-personal-resilience-science/id1649518468 Spotify: https://open.spotify.com/show/48GknFUDXjMsdisT6nRDh2 Amazon: https://music.amazon.com/podcasts/9d79c724-902a-4777-ab4a-b31968806798/bouncing-back-the-personal-resilience-science-insights-podcast iHeart Radio: https://www.iheart.com/podcast/338-bouncing-back-the-personal-102890036/ Podbean: https://thepersonalresilienceinsights.podbean.com/ PlayerFM: https://player.fm/series/3402362 Podchaser: https://www.podchaser.com/podcasts/bouncing-back-the-personal-res-4930612 Google: https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3RoZXBlcnNvbmFscmVzaWxpZW5jZWluc2lnaHRzL2ZlZWQueG1s
Yes, we're feeling it too - the world is heavy right now. Clinical psychologist and researcher Dr Alissa Knight shares remedies for helping you deal with the uncertainty that's swirling around us. WANT MORE FROM DR ALISSA? To hear today's full interview, where she chats about how to tap into your stress XX...search for Extra Healthy-ish wherever you get your pods. You can find Dr Alissa via The Calming Suite here or @australianpsychologistalissa. WANT MORE BODY + SOUL? Online: Head to bodyandsoul.com.au for your daily digital dose of health and wellness. On social: Via Instagram at @bodyandsoul_au or Facebook. Or, TikTok here. Got an idea for an episode? DM host Felicity Harley on Instagram @felicityharley. In print: Each Sunday, grab Body+Soul inside The Sunday Telegraph (NSW), the Sunday Herald Sun (Victoria), The Sunday Mail (Queensland), Sunday Mail (SA) and Sunday Tasmanian (Tasmania). See omnystudio.com/listener for privacy information.
If everything is feeling awful - the world, life, your mental load - the advice from clinical psychologist and researcher Dr Alissa Knight will help. She discusses stress, how to recognise it and simple strategies to cope. WANT MORE FROM DR ALISSA? Find out more about Alissa via The Calming Suite here or @australianpsychologistalissa. WANT MORE BODY + SOUL? Online: Head to bodyandsoul.com.au for your daily digital dose of health and wellness. On social: Via Instagram at @bodyandsoul_au or Facebook. Or, TikTok here. Got an idea for an episode? DM host Felicity Harley on Instagram @felicityharley. In print: Each Sunday, grab Body+Soul inside The Sunday Telegraph (NSW), the Sunday Herald Sun (Victoria), The Sunday Mail (Queensland), Sunday Mail (SA) and Sunday Tasmanian (Tasmania). See omnystudio.com/listener for privacy information.
Should you be using IoT devices? Think carefully ... there is a new Botnet out there targeting IoT devices. IoT devices unfortunately often have very poor security.... and can be targeted. // Juniper Free Training // Big thank you to Juniper Networks for supporting the community and making this training free (and sponsoring my channel). Go to https://juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). Use this voucher code to register for your courses: DAVIDBOMBAL If you have issues with the Juniper registration, please use these links that they gave me: For Login assistance link https://userregistration.juniper.net/... Customer Support link- https://support.juniper.net/support/r... // Occupy The Web SOCIAL // Twitter: https://twitter.com/three_cube // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw Direct links to courses: Pro Subscriber: https://davidbombal.wiki/otwprosub 3 year deal: https://davidbombal.wiki/otw3year // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Network Basics for hackers: https://amzn.to/3W1iiCQ Top Hacking Books you need to read: • Top Hacking Books for 2023 // Book Discussed // If it's smart it's vulnerable by Mikko Hypponen: https://amzn.to/3GdCbR0 // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Louis Rossmann YouTube // Louis Rossmann: / @rossmanngroup // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 01:40 - Sponsored Segment 03:17 - Welcome Back, OTW! 05:11 - OTW's New Course 06:42 - Hacking IoT 07:00 - Botnets and DDOS 14:03 - OpenWrt 18:34 - How do Botnets get Access? 21:57 - Electronic or Manual Locks? 26:28 - TikTok 30:24 - You Buy but You Don't Own 32:22 - Ring Doorbell Story 33:31 - Right to Repair 36:05 - Hacking Vehicles 40:44 - Luddites 47:00 - Conclusion iot mirai mirai botnet otw occupy the web internet of things hack hacking hacker cybersecurity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #cybersecurity #iot
On this week's episode I am super excited to be introducing you to our next special guest, Psychologist and Media Spokesperson Dr. Alissa Knight. Alissa is the Director and Founder of her own Psychologist Clinic ‘The Calming Suite Psychology'. Where Alissa practices as a Registered Psychologist, Eating Disorder Specialist, Psychology Media Spokesperson, Researcher, Conference Speaker, and Teacher. Dr. Alissa Knight has a Doctorate/PHD in Psychology, a Masters in Clinical Psychology, a Bachelor of Psychology (Honours), a Masters of Journalism and Mass Communication and a Bachelor of Education Junior/ Primary. Exceedingly, prior to Alissa becoming a Clinical Psychologist, she worked in roles as a Scientist (Researcher) in areas such as Psychiatry, Psychology and Nutrition. Alissa also worked as a Journalist (Breakfast Radio Host), a Primary School Teacher and a Professional Dancer. Which allowed Alissa to teach dance to children and adolescents at the Australian Dance Academy. Alissa is an accredited Les Mils BodyBalance (yoga, Thai chi, relaxation and meditation) instructor and taught BodyBalance in fitness centres around Australia for 9 years. As you can see Alissa has dedicated 17 amazing years to University study where she now holds 5 degrees across fields of Psychology, Neurology, Junior Primary/ Primary/ High School Dance Education and Journalism. On this week's episode I am delighted to be speaking with Dr. Alissa Knight as Alissa has appeared on Channel 7, Channel 9 and Channel 10 News for her expertise on the research into mental health. Specifically for her research into the phenomenon ‘drunkorexia' which was first pioneered in Australia by researchers such as Alissa. Alissa appeared on Channel 10 for her knowledge on mental health and the application of smartphone technology in the prevention & treatment of mental health. Alissa has also been invited to speak on numerous radio stations including on the ABC news in Adelaide, Sydney, Perth, and Darwin. Alissa also appeared on Triple J the Hack, appeared in the Australian newspaper, and several online news sites. Alissa has not only been recognised in Australia but also internationally such as in the Cosmopolitan magazine in New York where Dr. Alissa Knight was interviewed by Carrie Arnold. Alissa has also been chosen to be included in the Science Media Exchange (‘Scimex') and The Australian & New Zealand Science Media Centre with multiple articles, columns and press releases. As you can tell we are very lucky to be introducing you to this next special guest, Dr. Alissa Knight, who will so kindly be speaking about the topic of Overvaluing body image and physical appearance. With eating disorders becoming a major issue in our modern society Alissa speaks about perceptions of body image and physical appearance in conjunction with eating disorders. So please, let's get into it! Podcast Summary: 1. What influences our perception of physical appearance 2. Breaking down body image 3. When your perception of body image becomes too fixated 4. Living in a society that overvalues appearance 5. Body image from a neutral perspective 6. Being more compassionate towards your body Links to Dr. Alissa Knight: Website and ‘I am enough' event: https://thecalmingsuite.com.au/ Instagram: @australianpsychologistalissa Facebook: The Calming Suite Psychology- Dr Alissa Knight Links to BodyMatters: BodyMatters Australasia Website: https://bodymatters.com.au/ BodyMatters Instagram: @bodymattersau Butterfly Foundation Helpline: Call their National Helpline on 1800 33 4673. You can also chat online or email
This is a real world demonstration of the SQL Injection attack used in the recent MOVEit hack. This is real world - not just a simple SQL attack. Big thank you to Juniper Networks for supporting the community and making training free. Go to https://juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). // Mr Robot Playlist // • Mr Robot // Proof of Concept // Horizon3: https://www.horizon3.ai/moveit-transf... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Top Hacking Books you need to read: • Top Hacking Books... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription" https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:55 - Juniper Free Training (Sponsored segment) 01:51 - OccupyTheWeb books and new books 03:57 - The MOVEit breach explained 05:20 - Clop website // Companies affected 08:52 - The two different vulnerabilities 10:26 - The truth about SQL Injection 12:21 - Using Shodan 14:05 - Proof of concept of the exploit 16:18 - SQL Injection example 20:35 - MOVEit hack analysis / How it was done 28:57 - CVE-2023-35708 SQL Injection vulnerability explained 30:36 - What is Taiwan Semi-Conductor (TSMC) and why they got hacked 31:01 - SQL Injection hack in the real world 32:45 - OccupyTheWeb online classes 33:46 - Union statement // Stacking queries demo 37:02 - Upcoming OccupyTheWeb courses and classes 39:50 - Conclusion MOVEit sql sql injection hack hacking hacker pegasus cybersecurity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #cybersecurity #sql
Short episode this week! George K and George A weigh in on threads, cyber news, but most importantly, how to meet up at Black Hat 2023!
In this episode, Jacinta and Lachlan interview Dr Alissa Knight. Dr Alissa Knight is a clinical psychologist, researcher and founder of The Calming Suite. We discuss anxiety, perfectionism and mental health during the teen years. We also chat about disordered eating and binge drinking and the way these can sometimes go hand-in-hand. Finally we finish the conversation with a chat about self-care, balance and Alissa's amazing career. About our guest Dr Alissa Knight is a clinical psychologist, researcher and founder of The Calming Suite. Prior to becoming a psychologist, Alissa worked as a scientist/researcher, exploring areas such as psychiatry, psychology and nutrition. A woman of many talents, Alissa has also worked as a primary school teacher, journalist, professional dancer and yoga instructor. Having taught children for many years, Alissa was drawn towards working with youths in her psychology practice, particularly teens and young adults. With their whole lives ahead of them, Alissa is passionate about providing young people with the tools and skills needed to unlock joy and fulfillment. She is passionate about helping people to reach their full potential and transform their lives for the better. Content warning In this episode of Differently Brained we discuss alcohol abuse, disordered eating, suicidality and depression. Please feel free to skip this episode or reach out to medical professionals if it has brought anything up for you. Episode partner Are you tired of the same old boring puzzles? Mix things up with Wongo Puzzles! Each puzzle is a custom design, with intricate patterns and whimsical shapes that will keep you engaged for hours. Plus, their eco-friendly materials and commitment to sustainability make Wongo Puzzles a guilt-free way to unwind. Use our link https://zen.ai/differentlybrained or the code DB to save 10% at wongopuzzles.com. The discount will be applied at checkout! Representations & resources The Calming Suite website Dr Alissa Knight's Instagram and LinkedIn The Body Keeps the Score by Professor Bessel van der Kolk Eight Keys to Recovery from an Eating Disorder and the companion workbook by Carolyn Costin and Gwen Schubert Grabb More Than a Body by Lindsay Kite and Lexie Kite At Last a Life: Anxiety and Panic Free by Paul David You can purchase all of these book titles and more from your local independent bookseller or Booktopia. Please note by purchasing through these Booktopia partner links we are provided a small commission which allows us to continue to provide the podcast at no cost to our audience. About the podcast Differently Brained shares the opinions of individuals and does not consider your personal circumstances. Differently Brained exists purely for information purposes and should not be relied on as health or medical advice. Because no brain is the same, please consult your healthcare professional for your personal medical needs. The Differently Brained team acknowledge the traditional custodians of the lands on which we record, edit and stream this podcast. We pay our respects to all First Nations peoples and their Elders part, present and emerging. We extend that respect to all First Nations cultures and their ongoing connection to the lands, waterways and communities.
Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running. Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://brilliant.org/DavidBombal // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Top Hacking Books you need to read: • Top Hacking Books... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription" https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Intro 00:22 - Brilliant Add 01:59 - OTW Books 03:54 - Pegasus overview 06:54 - Pegasus info 07:40 - Pegasus in use 08:56 - Human rights 09:25 - 0 Day malware 13:33 - Original Pegasus 1 click exploit 14:30 - How it works 16:52 - Remote access 17:48 - Malware links 19:30 - Femtocell 21:01 - Stingray 22:10 - How they work 23:50 - Pegasus 0 click exploit 24:55 - Pegasus malware 25:29 - Human rights 26:51 - ISO/Android vs malware 27:40 - Governments 29:19 - What can we do? 30:35 - Be responsible 32:01 - Governments and malware 32:51 - NSO 35:14 - Privacy 36:03 - Command and control 37:36 - Processes 38:38 - NSO developers 38:53 - Expectations 40:30 - Social engineering 43:04 Eternal blue 44:25 Chrysaor 45:23 Outro thoughts pegasus spyware hacking hacker malware Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #pegasus #iphone #andorid
Is AI going to end the world? No more jobs in Cybersecurity? Are we going to survive the attacks? Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://brilliant.org/DavidBombal // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Top Hacking Books you need to read: • Top Hacking Books... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription" https://hackers-arise.com/online-stor... Get 3 year's access to all live courses: https://hackers-arise.com/online-stor... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 Coming Up 00:32 Thanks Brilliant! (Sponsor) 02:05 Why this video? 03:35 Cyber Security Future 04:51 AI 06:03 Don't Fall Behind 07:29 ChatGPT 08:47 AI Helps Both Sides 10:14 AI Spear Phishing 14:26 Asking AI Who Is OTW? 16:12 AI Changes And Updates 18:26 Spear Phishing Definition 20:01 Almost Got Scammed By AI 21:31 Data Leaks 21:31 Email Phishing Story 24:33 Snort 25:59 Splunk 27:39 AI Code Problems 28:36 The Truth About AI Jobs 30:25 Tricking The AI 33:54 Generate Generic Code With AI 36:31 The History 40:00 AI VS Human Thinking 41:53 OTW Course 42:10 Pegasus 43:10 Outro ai chatgpt chat gpt gpt4 google bard artificial intelligence hacking ai ai hacking Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ai #chatgpt #hacking
Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use? // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Top Hacking Books you need to read: • Top Hacking Books... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:51 - Don't use the nighbour's wifi 03:02 - OccupyTheWeb books 03:44 - How to remain anonymous on the internet // The NSA is watching 09:56 - Be careful of your browser 13:35 - Turn off cookies 15:41 - ProxyChains and Tor demo 22:10 - The FBI story 25:30 - ProxyChains and Tor demo continued 28:36 - How to remain anonymous 33:05 - Using Starlink 36:18 - Recommended operating systems 38:34 - Untraceable phones (burner phones) 40:05 - VPN vs Tor // Don't trust free proxies 42:29 - Don't keep systems together 44:24 - Recommended e-mail service 46:53 - Bitcoin is traceable 47:58 - Anti-forensics // How to clean systems 50:41 - Recommended search engines 51:34 - Have different identities/systems 52:26 - Conclusion tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #wifi #iphone #android
The curse of perfectionism is one many of us struggle with. Clinical Psychologist Dr Alissa Knight discusses how it can play out in your life, its link to mental health and how it can actually work for you. WANT MORE FROM ALISSA? Find out more about Alissa via The Calming Suite here. WANT MORE BODY + SOUL? Online: Head to bodyandsoul.com.au for your daily digital dose of health and wellness. On social: Via Instagram at @bodyandsoul_au or Facebook. Or, TikTok here. Got an idea for an episode? DM host Felicity Harley on Instagram @felicityharley. On YouTube: Watch Body + Soul TV here. In print: Each Sunday, grab Body+Soul inside The Sunday Telegraph (NSW), the Sunday Herald Sun (Victoria), The Sunday Mail (Queensland), Sunday Mail (SA) and Sunday Tasmanian (Tasmania).See omnystudio.com/listener for privacy information.
Trauma dumping - have you spotted this or been triggered by it on your socials? Clinical psychologist and researcher Dr Alissa Knight discusses it, the red flags and how to protect yourself. WANT MORE FROM ALISSA? To hear today's full interview, where she discusses perfectionism and how to stop it controlling your life...search for Extra Healthy-ish wherever you get your pods. Find out more about Alissa via The Calming Suite here. WANT MORE BODY + SOUL? Online: Head to bodyandsoul.com.au for your daily digital dose of health and wellness. On social: Via Instagram at @bodyandsoul_au or Facebook. Or, TikTok here. Got an idea for an episode? DM host Felicity Harley on Instagram @felicityharley. On YouTube: Watch Body + Soul TV here. In print: Each Sunday, grab Body+Soul inside The Sunday Telegraph (NSW), the Sunday Herald Sun (Victoria), The Sunday Mail (Queensland), Sunday Mail (SA) and Sunday Tasmanian (Tasmania). See omnystudio.com/listener for privacy information.
Guests:Alissa Knight, Hacker-turned-producer and founder of Knight Studios [@knightinkmedia]On LinkedIn | https://linkedin.com/in/alissaknightOn Twitter | https://twitter.com/knightinkmediaOn Facebook | https://www.facebook.com/knightalissaOn YouTube | https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQShannon Wilkinson, CEO and Founder of Tego Cyber, women in technology and STEM advocate, and formerly with the United Nations [@tegocyber]On Twitter | https://twitter.com/SWilkinsonCyberOn LinkedIn | https://linkedin.com/in/swilkinsoncyber____________________________Host: Deb RadcliffOn ITSPmagazine
Alissa is an author, speaker, and industry-recognized professional. She has recently pivoted much of her focus to Knight Studios, her media production company. We will catch up on what this means for the industry.You won't want to miss it. Live Q&A with Alissa Knight!Get daily cyber threat briefings with Simply Cyber every weekday. https://simplycyber.io/streams for all the details.Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.
This is your path to becoming a master hacker. From zero to getting the skills you need to be successful. // MENU // 00:00 - Coming up 00:43 - Top skills for hacking 01:34 - The Hacker Mindset 01:49 - Analytical/Problem Solving Skills // Be creative 05:34 - Persistence // Never give up 08:50 - CompTIA A+ and basic computer skills 09:21 - Networking skills // CompTIA Network+ and virtualisation 09:47 - Linux // CompTIA Linux+ 10:18 - Virtualization 12:02 - Basic Wireshark knowledge // Practical Packet Analysis 13:48 - Security concepts and technologies // CompTIA Security+ and Hackers-Arise Security+ Training 15:48 - Scripting skills // Python and GO 17:40 - Database skills // SQL injection 19:04 - Web application skills 19:57 - Forensics background // Understanding what you leave behind 21:28 - Learn more on Hackers-Arise.com 22:35 - Cryptography skills 23:42 - Conclusion // Videos mentioned // Top hacking books: https://youtu.be/trPJaCGBbKU Wireshark with Chris Greer: https://www.youtube.com/playlist?list... Vickie Li Bug Bounty Bootcamp: https://youtu.be/QqrK294l_oI // BOOKS // - Linux basics for hackers by Occupy the Web: https://amzn.to/3A2oJM1 - Gray Hat Hacking Sixth Edition, The Ethical Hacker's Handbook by Various Authors: https://amzn.to/3TkI0Pr - This is how they tell me the world ends by Nicole Perlroth: https://amzn.to/3NWj3st - Hands on Hacking by Matthew Hickey and Jennifer Arcuri: https://amzn.to/3WImAia - Penetration Testing by Georgia Weidman: https://amzn.to/3UL1i1D - The Science of Human Hacking by Christopher Hadnagy (social engineering): https://amzn.to/3UssbaM - Getting started becoming a master hacker by Occupy the Web: https://amzn.to/3EmguNa - Black Hat Python by Justin Seitz and Tim Arnold: https://amzn.to/3yQIdTD - Hacking Connected Cars by Alissa Knight: https://amzn.to/3G5cRN5 - Hacking: The Art of Exploitation by Jon Erickson: https://amzn.to/3ElVhTI - The Pentester Blueprint by Phillip L. Wylie and Kim Crawley: https://amzn.to/3WIoGP4 - Hacking API's by Corey J.Ball: https://amzn.to/3EfXDT5 - Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3GlG8U3 - Network basics for hackers by Occupy the Web (coming in 2023) // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web's SOCIAL // Twitter: https://twitter.com/three_cube // OTW Security+ // https://www.hackers-arise.com/security // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot cybersecurity cybersecurity jobs hacking comptia comptia a+ comptia network+ wireshark vmware wireshark sql sql injection comptia security+ python golang perl digital forensics database cryptography ethical hacking hacking jobs hack the box try hack me pico ctf htb thm cyber security career cybersecurity cybersecurity careers ceh oscp ine elearn security ejpt oscp oscp certification ctf for beginners first job cybersecurity job kali kali linux Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel #kalilinux #hacking #cybersecurity
Talking with Alissa Knight @alissaknight about her new project on the WORLD'S FIRST TV NETWORK FOR CYBERSECURITY CONTENT, COMING TO OVER 500 MILLION HOMES WORLDWIDE!. #SPACE recorded at 4:30PM EST December 5, 2022. Cover Artwork for this episode by: Gabriela Hernandez Blanco, @gabrielaABIE --- Send in a voice message: https://anchor.fm/darkwebtoday/message
What are the top hacking books to get started? Practical and good hacking books? OTW discusses his favourite Hacking and cybersecurity books with me. Do you agree with him? Did we miss any great books? // MENU // 00:00 - Coming Up 00:20 - Intro 00:25 - Welcome Back OccupyTheWeb 00:55 - Network Basics for Hackers 02:04 - Other Books Releasing 02:51 - OccupyTheWeb Book Recommendations 03:22 - Linux Basics for Hackers 05:02 - Gray Hat Hacking 05:52 - This is How They Tell Me the World Ends 07:49 - Hands On Hacking 09:33 - Penetration Testing 10:56 - Getting Started Becoming a Master Hacker 12:11 - The Science of Human Hacking 14:01 - Black Hat Python 15:25 - TikTok 16:15 - Hacking Connected Cars 17:47 - Hacking: The Art of Exploitation 18:29 - Pentesting Blueprint 19:21 - Hacking APIs 19:54 - Bug Bounty Bootcamp 21:02 - Books Conclusion 21:46 - Networking 22:58 - Conclusion 23:55 - Web Hacker's Handbook 24:29 - Go 25:39 - Hacker's Playbook 26:45 - Outro // BOOKS // - Linux basics for hackers by Occupy the Web: https://amzn.to/3A2oJM1 - Gray Hat Hacking Sixth Edition, The Ethical Hacker's Handbook by Various Authors: https://amzn.to/3TkI0Pr - This is how they tell me the world ends by Nicole Perlroth: https://amzn.to/3NWj3st - Hands on Hacking by Matthew Hickey and Jennifer Arcuri: https://amzn.to/3WImAia - Penetration Testing by Georgia Weidman: https://amzn.to/3UL1i1D - The Science of Human Hacking by Christopher Hadnagy (social engineering): https://amzn.to/3UssbaM - Getting started becoming a master hacker by Occupy the Web: https://amzn.to/3EmguNa - Black Hat Python by Justin Seitz and Tim Arnold: https://amzn.to/3yQIdTD - Hacking Connected Cars by Alissa Knight: https://amzn.to/3G5cRN5 - Hacking: The Art of Exploitation by Jon Erickson: https://amzn.to/3ElVhTI - The Pentester Blueprint by Phillip L. Wylie and Kim Crawley: https://amzn.to/3WIoGP4 - Hacking API's by Corey J.Ball: https://amzn.to/3EfXDT5 - Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3GlG8U3 - Network basics for hackers by Occupy the Web (coming in 2023) // Videos mentioned // - Hacking Cars like Mr Robot: https://www.youtube.com/watch?v=5LvqU... - Hacking Cell phones like Mr Robot: https://youtu.be/bK1lsI-ehL8 - Nicole Perlroth: Cybersecurity and the weapons of Cyberwar: https://youtu.be/hy2G3PhGm-g - Best Hacking Python Book: https://www.youtube.com/watch?v=2B76C... - Hacking API's and Cars: You need to learn this in 2022 https://www.youtube.com/watch?v=4VaHN... - Free API Hacking Course https://www.youtube.com/watch?v=CkVvB... - Bug Bounty Bootcamp https://www.youtube.com/watch?v=QqrK2... - Top 5 hacking books with Neal Bridges: https://youtu.be/VrayWzHKVw4 // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web's SOCIAL // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot hacking books hack hacker hacking python python hacking black hat python gray hat hacking linux linux for hackers bug bounty nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #hack #cybersecurity
Podcast: David BombalEpisode: #403: Are you safe from this?Pub date: 2022-11-10Are the hacks shown in Mr Robot fact or fiction? How real are they actually? OTW discusses new vulnerabilities and issues with devices found in millions of companies around the world. OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows. Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // MENU // 00:00 - Coming up // Hacking Uninterruptible Power Supplies (UPS) 00:28 - Intro & Disclaimers 00:40 - Mr Robot episode recap // Hacking UPSs 02:57 - UPS breakdown 04:23 - UPS GUI examples 05:38 - Accessing the UPSs through a Femtocell 06:57 - UPS vulnerabilities // Embedding malware in firmware updates 14:30 - Intelligence agencies // Collecting data 17:45 - UPS vulnerability // Lead-acid battery corrosion 20:12 - "Hacking can kill" 21:57 - The Mr Robot series // Reality or fiction? 26:17 - Importance of Social Engineering 27:38 - Conclusion // Mr Robot Playlist // https://www.youtube.com/playlist?list... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot kali linux linux parrot os kali hacker hacking hack cybersecurity ups apc nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #mrrobot #hacking #kalilinuxThe podcast and artwork embedded on this page are from David Bombal, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Are the hacks shown in Mr Robot fact or fiction? How real are they actually? OTW discusses new vulnerabilities and issues with devices found in millions of companies around the world. OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows. Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // MENU // 00:00 - Coming up // Hacking Uninterruptible Power Supplies (UPS) 00:28 - Intro & Disclaimers 00:40 - Mr Robot episode recap // Hacking UPSs 02:57 - UPS breakdown 04:23 - UPS GUI examples 05:38 - Accessing the UPSs through a Femtocell 06:57 - UPS vulnerabilities // Embedding malware in firmware updates 14:30 - Intelligence agencies // Collecting data 17:45 - UPS vulnerability // Lead-acid battery corrosion 20:12 - "Hacking can kill" 21:57 - The Mr Robot series // Reality or fiction? 26:17 - Importance of Social Engineering 27:38 - Conclusion // Mr Robot Playlist // https://www.youtube.com/playlist?list... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot kali linux linux parrot os kali hacker hacking hack cybersecurity ups apc nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #mrrobot #hacking #kalilinux
Get Proton VPN for free: https://go.getproton.me/SHWN or get Proton Mail here: https://go.getproton.me/SHWO OTW and I get asked this question all the time: "What's the best laptop to buy for hacking?" In this video we answer that question and more. // Menu // 00:00 - Coming up 00:32 - Intro 00:38 - Sponsored Segment 01:41 - "The perfect laptop for hacking" 04:50 - Getting the right CPU 06:52 - The importance of RAM 07:49 - WiFi adapters for WiFi hacking 09:45 - "Gear doesn't matter" 12:57 - Virtual Machines for beginners 15:40 - What OS do I need? 16:23 - VM issues with M1 & M2 chips 19:27 - Kali bare-metal and Kali VM 22:10 - Which Linux is better? 23:30 - Dragon OS // New OS for SDR 24:19 - Know your Linux! 25:26 - Don't waste money on the greatest and latest tech 26:34 - Desktop vs Laptop 27:51 - Learn hacking on a phone 29:48 - The Raspberry Pi // Effective learning environment 32:23 - Linux can work on old computers 33:01 - Conclusion // Videos mentioned // Best hacking laptop (2021 edition) with Neal Bridges: https://youtu.be/jsMp65-piIc SDR hacking: https://youtu.be/5LvqU3-iINk Kali Linux install on Raspberry Pi: https://youtu.be/PqRVo2niA_8 Kali Linux install on Android (rootless): https://youtu.be/KxOGyuGq0Ts Kali Linux USB boot: https://youtu.be/n2olKupv9fY Kali Linux WSL install: https://youtu.be/UXyS-xofGNM Kali Linux WSL2 GUI Apps: https://youtu.be/mp5DdgZP7ns Kali Linux Windows install: https://youtu.be/W6_nBr8SbPE Kali Linux macOS: https://youtu.be/fcrSmbUIHuo // Mr Robot Playlist // https://www.youtube.com/playlist?list... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Recommended WiFi adapters // Alfa AWUS036NHA: https://amzn.to/3wnyVen Alfa AWUS036ACM: https://amzn.to/3fCL4WT Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV Others: Alfa AWUS1900: https://amzn.to/31E0AtH Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL Alfa AWUS036NEH: https://amzn.to/3sK2iW8 Panda PAU05: https://amzn.to/3ue23Da Panda PAU06: https://amzn.to/3wwqRZ8 Panda PAU09: https://amzn.to/3wosx6X WiFi Nation 802.11ac AC600: https://amzn.to/3cLQddm WiFi Nation Atheros AR9271: https://amzn.to/3u8JUqm // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot kali linux parrot os kali hacker hacking hack best hacking laptop best laptop for hacking best hacker laptop hacker laptop hacker laptop setup best hacking laptop 2022 best hacking laptop and os best hacking operating system best hacking os vmware virtualbox bare metal hacker cybersecurity nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #kalilinux #parrotos
Movie producer, award-winning filmmaker, and viral sensation, Alissa Knight joins 2 Cyber Chicks for an authentic chat about her career from hacker to producer and her accolades in between. Alissa is a pioneer in the industry and revolutionizes cybersecurity content while paving the way for future generations. Tune in to hear about her upcoming projects (you heard it here first!!!) and get to know more about this AMAZING cyber chick.__________________________GuestAlissa KnightPartner, Knight Group | Director & Executive Producer, Knight Studios | Managing Partner, Knight Events | Partner, Knight Ink [@knightinkmedia]On Twitter | https://twitter.com/alissaknightOn LinkedIn | https://www.linkedin.com/in/alissaknight/On YouTube | https://www.youtube.com/c/AlissaKnight__________________________HostsJax ScottOn ITSPmagazine
Movie producer, award-winning filmmaker, and viral sensation, Alissa Knight joins 2 Cyber Chicks for an authentic chat about her career from hacker to producer and her accolades in between. Alissa is a pioneer in the industry and revolutionizes cybersecurity content while paving the way for future generations. Tune in to hear about her upcoming projects (you heard it here first!!!) and get to know more about this AMAZING cyber chick.__________________________GuestAlissa KnightPartner, Knight Group | Director & Executive Producer, Knight Studios | Managing Partner, Knight Events | Partner, Knight Ink [@knightinkmedia]On Twitter | https://twitter.com/alissaknightOn LinkedIn | https://www.linkedin.com/in/alissaknight/On YouTube | https://www.youtube.com/c/AlissaKnight__________________________HostsJax ScottOn ITSPmagazine
Alissa Valentina Knight is a renowned cybersecurity specialist, an American author, film director, producer, and a board member for Conceal. In this episode, Alissa joins host Hillarie McClure to discuss her latest project, a new miniseries called “Ransom,” how people can attend the premiere and stream it digitally, as well as some other new projects on the horizon for Knight Studios, and more. For more information about the premiere of “Ransom,” visit https://conceal.io/event/blackhat-ransom-movie-premiere/. To learn more about Alissa and her work, visit https://alissaknight.com. • For more on cybersecurity, visit us at https://cybersecurityventures.com
You need to learn how to hack APIs in 2022. This is the future battlefront! Ignore this at your own peril. // MENU // 00:00 ▶️ Coming up 00:44 ▶️ Intro 00:53 ▶️ Alissa Knight introduction and background 02:36 ▶️ Published author and filmmaker 03:30 ▶️ Alissa Knight YouTube channel 05:02 ▶️ Book on API hacking 06:05 ▶️ The definition of hacking 10:25 ▶️ How to approach hacking 14:10 ▶️ The importance of learning 16:07 ▶️ How to start hacking APIs 22:54 ▶️ "The Desire" 25:35 ▶️ Recommended certifications 28:35 ▶️ Understanding Networking fundamentals 30:04 ▶️ Do you have to be a programmer to hack? 33:09 ▶️ Mastering tools 34:33 ▶️ Hacking APIs 38:43 ▶️ Shift left security, shield right 40:15 ▶️ Bank app developed by marketing team 42:51 ▶️ Smart phone takeover 45:10 ▶️ How to learn to hack APIs 48:11 ▶️ Process on how to hack APIs 55:05 ▶️ Implementing authorization and authentication 56:43 ▶️ APIs in nuclear plant systems 58:52 ▶️ Wifi pineapple 01:01:23 ▶️ Securing APIs in cars 01:03:18 ▶️ "Exciting times" 01:05:45 ▶️ Conclusion Nahamsec Interview: https://youtu.be/Y2Y4Sk0PswU // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Alissa's SOCIAL // Twitter: https://twitter.com/alissaknight YouTube: https://www.youtube.com/alissaknight Instagram: https://www.instagram.com/alissaknight/ LinkedIn: https://www.linkedin.com/in/alissakni... Website: https://www.alissaknight.com/ Hacking Bank APIs: https://davidbombal.wiki/hackingbankapis // Katie Paxton-Fear // YouTube: https://www.youtube.com/c/InsiderPhD Twitter: https://twitter.com/insiderphd // David Sopas // Twitter: https://twitter.com/dsopas Github API mindmap: https://github.com/dsopas/MindAPI // Hyperfocus daily task sheet // Alissa Knight's Daily Task Sheet: https://davidbombal.wiki/dailytasks // BOOKS // Hacking Connected Cars - Alissa Knight: https://amzn.to/3Ke00GO Hyper Focus - Chris Bailey: https://amzn.to/3vAocxO Self Journal by BestSelf: https://amzn.to/3ks1BhK Hacking APIs - Corey Ball: https://amzn.to/37PUwoI The Official (ISC)2 CISSP CBK Reference: https://amzn.to/3vxzjJ2 // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com api apis postman burpsuite hacking hacking cars hacking connected cars hacking api cyber security information security sans institute cybersecurity training cyber security training information security training cyber hack privacy nsa oscp ceh Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #infosec #cyber
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries. In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing. Details can be found here: White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs” Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers Alissa's presentation at Money 20/20.
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries. In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing. Details can be found here: White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs” Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers Alissa's presentation at Money 20/20.
Alissa Knight joins Ron and Chris to wrap up this season 2 of Hacker Valley Red. Why? Some big news is why! Stay tuned for that and much more as the trio dive back into the mind of a hacker. Key Takeaways: 02:57 Big News! 03:20 Alissa's Bio, round 2 05:10 Ron's takeaway for this season of Hacker Valley Red 06:43 Alissa's take on Lisa Forte 09:30 “My content is different” 11:38 Hacking an entire industry and doing research with it 18:56 The generational difference – Past vs. Present 21:10 Alissa and the video world 23:49 The dream guest 26:13 Alissa asks the golden question Links: Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Alissa Knight: YouTube | LinkedIn | Twitter | Website Support Hacker Valley Studio on Patreon Join our monthly mastermind group via Patreon HVR is proudly presented by Axonius
Welcome back to Hacker Valley Red season two. This week Chris and Ron are joined by a hacker through and through. Alissa Knight blends influencer marketing, content creation in writing and filmmaking/cinematography, and go-to market strategies for telling brand stories at scale in cybersecurity through the lens of a hacker. She achieves this through ideation to execution of content strategy, storytelling, and execution of influencer marketing strategies that take cybersecurity buyers through your brand's custom curated journey. But more importantly, she tells us what it takes to hack an entire industry... Key Takeaways: 03:25 Bio 05:59 Why hacking? 07:32 What is FHIR? Hear how it was to hack it. 10:43 I'm just a hacker who did homework 13:50 Unexpected vulnerability 17:57 Support 20:22 How an API works 24:23 Input validation 29:28 A date worth more than oil 33:23 How to scale efforts Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Alissa Knight: YouTube | LinkedIn | Twitter | Website Support Hacker Valley Studio on Patreon Join our monthly mastermind group via Patreon HVR is proudly presented by Axonius
On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Alissa Knight, author of the book Hacking Connected Cars and self described “recovering hacker.” Their conversation covers content creation, API's and hacking cars. Alissa grew up in Seattle, Washington where there was a big art scene. She began building her own computers and running her own boards at an early age. She says a lot of people don't know that she started out in the BBS scene back in the 90's. At seventeen she hacked into a government network and was arrested. Eventually, the charges were dropped on a technicality and she went on to work for the US Intelligence Community in cyber warfare. 2:08 - The episode and guest are introduced. 3:19 - Alissa gives an overview of her background. 6:29 - How Alissa's career began. 10:16 - Do you have to program to hack? 14:26 - What led Alissa to hacking cars? 24:55 - Alissa explains what people get wrong about the red team. 29:25 - Alissa answers the question, “is there an unhackable device?” 36:54 - How KnightTV came into being. 41:08 - Alissa gives her advice on where to start getting into cyber security Links: Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ronald Eddings on Twitter Follow Chris Cochran on Twitter Follow Alissa Knight on Twitter Subscribe to Alissa's YouTube Channel Learn more about the season sponsor, RiskIQ
The state of API Security is in constant flux, with traditional WAF technologies being paired with, and extended by, newer models of application-driven protections. With Gartner recognizing this trend and introducing a Web Application & API Protection market, what do two long-time API security leaders think about WAFs and their immediate and long-term limitations? More pointedly, why don't traditional WAFs work well when it comes to securing APIs?We're glad you asked - that's precisely what Alissa Knight and Kunal Anand get into during this high-energy, in-depth conversation about the future of APIs and the future of API security in this latest Their Story with Imperva.Listen in to this unscripted and incredibly passionate conversation to learn about their best practices and recommended approaches to API security. It may help you to change or tune-up, your perspective and take new actions.Note: This story contains promotional content. Learn more.____________________________HostAlissa KnightOn ITSPmagazine
Alissa Knight, partner at Knight Inc Media, shares her insights into how to protect your APIs and what's in store with the latest version of FHIR. Specifically, we cover: • Avoid prison yellow and become an ethical hacker • Authentication doesn't equal authorization • Protect against BOLA with scopes • Don't use WAFs to protect your APIs • Know what traffic is going to your API • Shift left security. Shield right. • PHI is worth 1,000X credit card info • APIs are the weakest link in healthcare • APIs have multiple attack surfaces • Banning apps from jail-broken phones doesn't help • Use MobSF to find API keys • APIs need to comply with FHIR • Implement FHIR correctly • Get FHIR certified • FHIR certification versus HIPAA compliance • There's no one right solution for API security • Instrument your APIs
PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the definitive report on the BAHAMUT threat group, is employed by HP. He is, in fact, employed by Blackberry. I sincerely apologize to Mr. Milam for the error.In this special episode, we look back at how the show has evolved over the past three years and celebrate our amazing guests and viewers. You've helped grow the Cyber Work Podcast to nearly a million plays! To give back, we're launching a brand new way for EVERYONE to build their cybersecurity skills. It's free. It's hands-on. Oh, and did we mention there's more than $1,000 in prizes EVERY MONTH. – Learn more about the Infosec Skills monthly challenge: https://www.infosecinstitute.com/challenge– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastHuge thank you to all the past guests who shared their expertise over the past 200 episodes. The timings of everyone in this episode are listed below. Happy listening!0:00 - Intro0:42 - Monthly challenges and $1,000 in prizes!1:30 - Cyber Work Podcast origins 2:32 - First episode with Leighton Johnson3:16 - Finding our first guests3:46 - Keatron Evans on incident response6:54 - Susan Morrow on two-factor authentication8:54 - Susan Morrow on GDPR 11:03 - Susan Morrow on "booth babes" and speaking up13:20 - Alissa Knight on getting arrested for hacking at 1716:39 - Alissa Knight on API security19:14 - Ron Gula on cybersecurity challenges23:23 - Amber Schroader on the real work of digital forensics26:19 - Theme of the Cyber Work Podcast27:01 - Jeff Williams on creating the OWASP Top Ten31:23 - David Balcar on the biggest APTs33:46 - Elie Bursztein on breaking into cybersecurity37:37 - Sam King on AppSec frameworks and analysis41:17 - Gary DeMercurio on getting arrested for red teaming47:19 - Eric Milam on the BAHAMUT threat group 53:39 - Feedback from Cyber Work Podcast listeners55:16 - Alyssa Miller on finding your career path 57:24 - Amber Schroader on computer forensics tasks59:07 - Richard Ford on malware analyst careers1:02:02 - Career action you can take today 1:02:19 - Rita Gurevich on reading and learning1:03:20 - Snehal Antani on transitioning careers1:04:26 - Promoting underrepresented voices1:05:09 - Mari Galloway on women in cybersecurity1:05:31 - Alyssa Miller on diversity "dog whistles"1:10:11 - Christine Izuakor on creating role models1:10:52 - We want to hear your story1:11:40 - Monthly challenges and outro About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Alissa Knight interviews Rinki Sethi, CISO of Twitter, discussing her 90-day plan, being hired as a CISO following a major breach, API hacking, security and privacy, and what keeps her up at night.Rinki offers a "day in the life" of being a CISO for a company like Twitter, the importance of Twitter as a platform for freedom of speech while also maintaining user privacy, Twitter as a critical infrastructure for the world, and her journey from starting as a security engineer to becoming the CISO for a publicly traded company with a $55 Bn market cap and a daily active user base of 206 million.________________________________GuestRinki SethiOn Linkedin
In this episode, Mike welcomes recovering hacker Alissa Knight and HL7 Standards Architect and member for the FHIR Management Group, John Moehrke. Join us as they discuss Fast Healthcare Interoperability Resources (FHIR), a standard that defines how healthcare information is exchanged between computer systems. John and Alissa both acknowledge the challenges of maintaining a standard where implementations vary greatly.
In this episode, author, hacker, entrepreneur, and content creator Alissa Knight reveals her journey from “bullied computer nerd” to federal cybersecurity contractor to famed car hacker. She gets real about the risk of APIs, offers up some must-hear advice for anyone getting into cybersecurity, and delivers candid views about the infosec industry as a whole. -------Why you should listen:* Get inside the head of one of the most provocative and interesting cybersecurity influencers today.* Hear about her work with federal agencies to help secure the future of transportation.* Learn more about the urgent need for better Application Programming Interface (API) security.* Get new insights into the growing threat to health care organizations and financial institutions.* Hear Alissa's take on how cybersecurity companies can improve their approach to content and marketing.-------Key Quotes: * “I care more about the adversary that can hack my car from her living room. I care more about the hacker that can take remote control of my car that I'm driving around in my family with, from anywhere.”* “Okay. Yes. I can take remote control of this vehicle. I can move the steering wheel. I can push the brakes.”* “You would be shocked if I told you how endemic [it is in] the industry to hard-code not only tokens, keys, and credentials like usernames and passwords and to apps for their own APIs, but also third-party APIs like payment processors.”* “The plumbing for our entire financial system and healthcare system is APIs...that data is worth more than oil, right? So hackers are shifting their attention to hacking APIs.”-------Related Links:* Alissa Knight's Twitter: @alissaknight * Knight Ink Media: https://knightinkmedia.com/* Alissa Knight's Website: https://www.alissaknight.com/* Official Trailer: Law Enforcement Vehicle Hack: https://www.youtube.com/watch?v=Soj3P3S3i_o* Synack Website: Synack.com * Synack Trust Report: https://www.synack.com/trust-report/* Jeremiah Roe's Twitter: @c1ph3rflux* Bella DeShantz-Cook's Twitter: @bellarosedc* Black Hat Events: https://go.synack.com/black-hat-events-2021
Self proclaimed recovering hacker Alissa Knight discusses some of the advanced hacking she has done and is working on.Alissa's skills goes beyond hacking into areas like content creation on a high level exceeding what is normally seen within cybersecurity. She is also business person and serial entrepreneur creating and selling businesses over her career.___________________________________GuestAlissa KnightOn Twitter
Self proclaimed recovering hacker Alissa Knight discusses some of the advanced hacking she has done and is working on.Alissa's skills goes beyond hacking into areas like content creation on a high level exceeding what is normally seen within cybersecurity. She is also business person and serial entrepreneur creating and selling businesses over her career._______________________GuestAlissa KnightOn Twitter
In episode 62, Alissa Knight, the author of Hacking Connected Cars, joins us to talk about hacking connected cars, APIs, defense as well as vulnerability management. My 3 main takeaways were 1) Where to even begin with car hacking 2) The challenges car manufacturers have when trying to defend against these attacks and 3) How APIs are shaping the future of hacking For more information, including the show notes check out: https://breachsense.io/podcast
Gifted hackers can access data from a government website, a hospital medical system, or even a car. Most are not aware when their personal information is stolen, sold, and used until it is too late. Today’s guest is Alissa Knight. Alissa is a recovering hacker of 20 years, a cyber security influencer, content creator, and the principal cyber security analyst at Alissa Knight and Associates. She is the author of the recently released book Hacking Connected Cars. Alissa has been quoted in articles by Brian Krebs and featured in numerous magazine articles including PC Magazine, Wired, and Forbes. Show Notes: [1:01] - Alissa shares how she started hacking at the age of 13 and she got caught hacking a government network. They came to arrest her at school. [2:27] - After this experience, Alissa later went on to own a few startups and sold them for millions of dollars. [3:44] - Alissa explains her combat training when owning a defense contracting company. She then transitioned back into cyber security. [5:10] - Her company shifted from defense contracting to private sector cyber security. [6:06] - While living in Germany, Alissa got into hacking connected cars. [7:07] - Although Alissa knows the risks of having connected technology, she is definitely a consumer of connected devices. [7:55] - We are seeing a fundamental change in cybersecurity because now it isn’t just about information. It can literally be life or death. [9:02] - Alissa loves cinematography and combines her knowledge of hacking and content creation. [10:17] - Cybersecurity can be boring and uninteresting. Alissa states that she got tired of seeing the same white papers and changed it up to make it more interesting not just for her but for clients as well. [11:22] - Alissa references a book called Blue Ocean Strategy and summarizes its content in relation to her business model and content. [12:58] - “A lot of the content out there for security is told through the eyes of a blue team member. It’s told through the eyes of the defender. Very rarely do we see content being told through the eyes of the adversary.” [14:13] - Alissa describes what she wants people to see through her content. [15:58] - In Alissa’s opinion, we need to relearn the concept of prevention. [17:27] - Chris points out that many mistakes are made when people think they have an impenetrable system. They become complacent. [18:20] - There are so many products out there right now that become very overwhelming and many don’t know what to choose or buy. [19:17] - Alissa breaks down the categories of mHealth and describes how she was able to hack into them. [20:59] - When testing these systems through hacking, Alissa was shocked at how much information she was able to access about patients. [22:01] - Alissa explains the rule that CMS passed called FHIR. [24:36] - Describing the systems that hospital systems use, Alissa points out some issues with lack of security. [26:48] - Alissa shares a personal story about being diagnosed with cancer and the experience of getting an email with her medical data available through a mobile app. [29:21] - The average person is not digging deep to find where their information could have been published on the darkweb. [30:54] - Alissa explains the differences between what some providers can and cannot do with data. [31:41] - To explain a BOLA vulnerability, Alissa uses an easy to visualize analogy. [33:58] - Some of the problems in the APIs that Alissa is testing is insecure coding and programming. She lists how this can see patient health information in medical systems. [35:13] - Simply changing an ID slightly once it has been authenticated is the number 1 vulnerability in APIs. Alissa says it's the easiest hack in the world. [36:08] - Sharing a story about an experience with a pen tester, Chris demonstrates how important testing for vulnerabilities is. [38:16] - We as consumers have to rely on manufacturers to make more secure cars and our healthcare providers to create more secure programs. It’s unfortunately out of our hands. [39:54] - It is not an immediate thing to learn. Alissa points out the many tools and the importance of understanding them. [42:16] - Exploits and these penetration testing tools are important, but if they are in the wrong hands they can be used for different purposes. [43:32] - When the developer is responsible for data, it leads to many problems. Alissa describes what can happen. [46:19] - Alissa explains what she predicts what she thinks will happen in the future. [47:28] - “I think zero trust should have been the foundational elements of the building blocks from the beginning.” [49:37] - There is a lot of amazing technology coming from Tel Aviv which is a shift from the past. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Alissa Knight on YouTube Alissa Knight Home Page Alissa Valentina Knight on LinkedIn Alissa Knight on Twitter Hacking Connected Cats: Tactics, Techniques, and Procedures by Alissa Knight
Recovering hacker extraordinaire and content creator Alissa Knight is a disruptor. Her videos and white papers from the perspective of an adversary exist to assist companies in determining the efficacy of their products. Join us as she talks about mobile app security, FHIR, and what it means to be a hacker.
You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human!From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a book about it, Alissa Knight has accomplished many notable things in her career to date.In this episode we talk about her prior accomplishments, a few new surprises that are in the works, and even her dream pet, but we do not talk about any failures! As Alissa mentions, “failure isn't until we've given up,” which is certainly not something you'll see her doing anytime soon, or ever for that matter.We cannot wait to have Alissa back on the show in the future to update us on her new ventures. We hope you enjoy listening to this episode as much as we enjoyed recording it!Now go follow your dreams and reach your goals!GuestAlissa Knight, Partner, Knight Ink (@alissaknight on Twitter | @alissaknight on Medium)HostsAngela Marafino | Chantel SimsThis Episode's SponsorsIf you'd like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here: https://www.itspmagazine.com/podcast-series-sponsorshipsResources(Book) Hacking Connected Cars: Tactics, Techniques, and Procedures —https://www.amazon.com/Hacking-Connected-Cars-Techniques-Procedures/dp/1119491800/For more podcast stories from Focal Point with Chantel Sims and Angela Marafino, visit: https://www.itspmagazine.com/focal-point-podcastAre you interested in sponsoring an ITSPmagazine Channel?https://www.itspmagazine.com/podcast-series-sponsorships
“Recovering hacker” Alissa Knight shares her frightening first-hand experience breaching dozens of mobile banking apps and other Internet of Things embedded systems. Also- Ant Financials' lower valuation and the UK's Buy Now Pay Later reckoning.
Alissa Valentina Knight, a renowned cybersecurity influencer, content creator, entrepreneur, published author, and a recovering hacker of 20 years, joins host Hillarie McClure to share her story in this special episode of Cybercrime Radio. Alissa has been featured on Wired, Fox, and DarkReading among many others, and is also a prolific speaker at industry events and conferences. You can visit her website at https://alissaknight.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
This week, we welcome Alissa Knight, Partner at Knight Ink, to discuss Being a Serial Entrepreneur, Business Leader, & Hacker! Alissa Knight has spent her career going against industry and social norms as both a Transgendered and Lesbian business leader and hacker. Learn more about her, her achievements as a published author, her recent vulnerability research in hacking law enforcement vehicles, mHealth apps and APIs, her life as a hacker, and barriers she's broken down in business. In the AppSec News, Funding bounties or finding bugs, how should we invest? Talks from Enigma Conference on memory unsafety and 0-days. Coming trends in API security and a review of research from 2020! Show Notes: https://securityweekly.com/asw139 Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Alissa Knight, Partner at Knight Ink, to discuss Being a Serial Entrepreneur, Business Leader, & Hacker! Alissa Knight has spent her career going against industry and social norms as both a Transgendered and Lesbian business leader and hacker. Learn more about her, her achievements as a published author, her recent vulnerability research in hacking law enforcement vehicles, mHealth apps and APIs, her life as a hacker, and barriers she's broken down in business. In the AppSec News, Funding bounties or finding bugs, how should we invest? Talks from Enigma Conference on memory unsafety and 0-days. Coming trends in API security and a review of research from 2020! Show Notes: https://securityweekly.com/asw139 Visit https://www.securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Alissa Knight has spent her career going against industry and social norms as both a Transgendered and Lesbian business leader and hacker. Learn more about her, her achievements as a published author, her recent vulnerability research in hacking law enforcement vehicles, mHealth apps and APIs, her recent screenplay for her new TV series, her life as a hacker, and barriers she's broken down in business. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw139
Alissa Knight has spent her career going against industry and social norms as both a Transgendered and Lesbian business leader and hacker. Learn more about her, her achievements as a published author, her recent vulnerability research in hacking law enforcement vehicles, mHealth apps and APIs, her recent screenplay for her new TV series, her life as a hacker, and barriers she's broken down in business. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw139
Did you know your personal health information is worth way more on the dark web than your financial information? On this episode, Dara talks with Alissa Knight, renowned hacker, investor and entrepreneur to discuss vulnerabilities of APIs, what that means for the world of telemedicine, and steps organizations should be taking to keep customer information safe.
On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Alissa Knight, author of the book Hacking Connected Cars and self described “recovering hacker.” Their conversation covers content creation, API’s and hacking cars. Alissa grew up in Seattle, Washington where there was a big art scene. She began building her own computers and running her own boards at an early age. She says a lot of people don’t know that she started out in the BBS scene back in the 90’s. At seventeen she hacked into a government network and was arrested. Eventually, the charges were dropped on a technicality and she went on to work for the US Intelligence Community in cyber warfare. Alissa’s first start-up was a web design company where she ran a Lennox webserver around the time the teardrop attack in Lennox servers. The people she rented office space from were teardropping her web hosting server. She picked up a book on cyber security, and got introduced into the world of cyber security through necessity. She had a passion for finding vulnerabilities, and understanding things that were difficult to understand, which is what brought her to embedded systems. The rest she says is history. As the episode ends, Alissa talks about her YouTube Channel, KnighTV. She says she’s always been an artist, and always wanted to do things at 200%. Her following is relatively new, at the beginning of 2019 she only had 4 followers on Twitter and now she’s passed the threshold to be part of the YouTube Partner Program. She wanted a cinematic experience for the viewer to stand out and not be just another video for the viewer. For anyone interested in getting started in being a breaker, she’s posted a couple videos on the topic, and explains there are many resources at their disposal. She says this line of work takes grit, and in her opinion a passion for reading. 2:08 - The episode and guest are introduced.3:19 - Alissa gives an overview of her background.6:29 - How Alissa’s career began.10:16 - Do you have to program to hack?14:26 - What led Alissa to hacking cars?24:55 - Alissa explains what people get wrong about the red team.29:25 - Alissa answers the question, “is there an unhackable device?”36:54 - How KnightTV came into being.41:08 - Alissa gives her advice on where to start getting into cyber security Links:Learn more about Hacker Valley StudioSupport Hacker Valley Studio on PatreonFollow Hacker Valley Studio on TwitterFollow Ronald Eddings on TwitterFollow Chris Cochran on TwitterFollow Alissa Knight on TwitterSubscribe to Alissa’s YouTube ChannelLearn more about the season sponsor, RiskIQ
Don’t miss this action-packed episode hosted by Jason Henrichs and co-hosted by Dara Tarkowski host of Tech on Reg. Jason and Dara are joined by Alissa Knight a recovering hacker and Patrick Sells bank innovator extraordinaire to discuss data privacy, cybersecurity in banking/fintech, and much much more. This episode will leave you questioning where you stand on the issues surrounding data ownership and have you wondering if that TikTok dance was really worth it.
Alissa Knight returns as the first ever three-peat Cyber Work guest, and the topic this week is — herself! Recorded at the end of pride month, Alissa talks about the benefits of diversity and inclusion when it comes to cybersecurity, her work hacking Bluetooth LE smart devices, her new company Knight Ink and a concept she’s created called “adversarial content.”– Enter code “cyberwork” to get 30 days of free training with Infosec Skills: https://www.infosecinstitute.com/skills/– View transcripts and additional episodes: https://www.infosecinstitute.com/podcastAlissa Knight is a published author, the managing partner at Knight Ink, principal analyst at Alissa Knight & Associates and group CEO at Brier & Thorn. She is a recovering hacker of 20 years and as a serial entrepreneur has started and sold two companies prior to her ventures she runs now. Alissa is a cybersecurity influencer working for market leaders and challenger brands in cybersecurity as a content creator. Follow her on Twitter and LinkedIn, and subscribe to her YouTube channel to follow her adventures in entrepreneurship and cybersecurity.– YouTube: https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQ– Twitter: https://twitter.com/alissaknight?lang=en– LinkedIn: https://www.linkedin.com/in/alissaknight/About InfosecAt Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and skills development training. We also empower all employees with security awareness and training to stay cybersecure at work and home. Founded by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
In this episode of the Virtual Coffee with Ashish edition, we spoke with Alissa Knight, Car Hacker, Author, Cybersecurity Influencer and Entrepreneur Host: Ashish Rajan - Twitter @hashishrajan Guest: Alissa Knight - Twitter @alissaknight What is a Connected Car? What is API? How do I secure APIs? How can someone secure API for Connected Cars? What should you do to monitor API? Can I buy a Tesla? Apple has API to record body contact, which cannot be turned OFF COVID Safe apps and the future of how freely information is collected by internet aware smart devices? Who do you report to when you are concerned about your connected car? ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv Twitter - @kaizenteq @hashishrajan @alissaknight
The Uncommon Journey Talk Show On ITSPmagazine | Episode 4 Hosts: Alyssa Miller, Chloé Messdaghi, and Phillip Wylie Guest: Alissa Knight In this episode, Alyssa, Phillip and Cloe talked to Alissa Knight about her early days as a hacker hanging out on BBS systems and how she discovered a career in security. There was also plenty of discussion about hacking connected cars, since Alissa literally wrote the book on it. So the conversation definitely covered that topic quite a bit. Tune in to learn more about who inspired Alissa's trajectory as woman of influence in security and what she has planned for the future. __________________________________ For more Uncommon Journey podcasts: https://itspmagazine.com/the-uncommon-journey-talk-show-podcast-phillip-wylie-chloe-messdaghi-alyssa-miller __________ Interested in sponsoring an ITSPmagazine talk show? Visit: https://www.itspmagazine.com/podcast-series-sponsorships
A constantly evolving connected environment, coupled with consumer demand for all things digital, is leading to unprecedented cybersecurity challenges. While consumers are becoming more comfortable banking and shopping online, investments in maintaining security and preventing data theft and breaches often lag behind. Data breaches continue to make the headlines in North America, with an estimated 60 million Americans being affected by identity theft. The U.S. also suffers from a higher attack rate overall, compared to Canada and the U.K. How do we balance data privacy and security – with convenience and a frictionless customer experience? In this new episode of “The Other 50”, Theo and Brad chat with security expert Alissa Knight on her most recent project that has uncovered security challenges with 30 banks. In this API economy, security must not be an afterthought. Incumbents and startups alike must take the necessarily steps to safeguard consumers’ data and assets – and to provide the necessary mechanisms to educate consumers on the importance of cybersecurity hygiene. See acast.com/privacy for privacy and opt-out information.
A constantly evolving connected environment, coupled with consumer demand for all things digital, is leading to unprecedented cybersecurity challenges. While consumers are becoming more comfortable banking and shopping online, investments in maintaining security and preventing data theft and breaches often lag behind. Data breaches continue to make the headlines in North America, with an estimated 60 million Americans being affected by identity theft. The U.S. also suffers from a higher attack rate overall, compared to Canada and the U.K. How do we balance data privacy and security – with convenience and a frictionless customer experience? In this new episode of “The Other 50”, Theo and Brad chat with security expert Alissa Knight on her most recent project that has uncovered security challenges with 30 banks. In this API economy, security must not be an afterthought. Incumbents and startups alike must take the necessarily steps to safeguard consumers’ data and assets – and to provide the necessary mechanisms to educate consumers on the importance of cybersecurity hygiene. See acast.com/privacy for privacy and opt-out information.
We caught up with the impressive Alissa knight who first came to Ricki's attention when she responded to a comment on Twitter. Alissa started hacking at 13, went on to sell two companies in her 20's and has a very interesting story to tell.
PODCAST #312 The World’s Digital Bank (Aired 11/7) Brett King hosts Alissa Knight, author of #Hacking Connected Cars, and the Senior #CyberSecurity Analyst for Aite group. Then, we’re joined by Henry Ma, CIO and Co-Founder of #WeBank, the largest challenger bank in the world, talking their path to nearly 180 million customers and how they've worked to reinvent #FinancialInclusion in #China.
Securing your mobile app, vulnerabilities in APIs, and finding the right security partners
Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcoming book. Join us in the fight against cybercrime: https://www.infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast.
By Marco Ciappelli and Sean Martin "A long time ago in a galaxy far, far away...." I cannot think of a better way to start this intro chronicle to today's Episode. While it will become clear why this is the case as you listen to it, you will probably come to envision a movie made from this story. I sure saw one in my head while I was following along as Alissa was telling us about her many adventures. The truth might be that I have quite an over sensitive imagination—nothing new there—but I really couldn't resist the impulse of pausing her long enough so I could grab a bucket of popcorn. I know it wasn't just me because Sean was listening quietly for a long time. If you know us, as you should by now, you are likely aware that for he and I, sitting quietly in the background is not an easy thing to do. So, let me try to remember: it starts like many with the passion for computers; Alissa built a few to play video games and to hack them; she hacked the government at age 17; got arrested on campus; got to work for the US intelligence in cyber-warfare; she started a couple of successful start-ups; she is an avid car hacker, IoT hacker, penetration tester, investigator, and analyst; she is a CEO, leader, and advisor; she is a content creator, book author, and speaker___ let me take a deep breath here. I am already tired just by writing all this—I cannot even imagine doing them all. There is even a part of the story when she takes a break from cybersecurity to join a private military company and starts doing defense contracting, swapping the keyboard for an AR15. Let me tell you, Alissa Valentina Knight sure doesn't like to get bored. And she is also in denial about her hacking past, present, and future as she said to us that she considers herself a recovering hacker. Naturally, I had to step on the table and called her out on that: as we all know "once a hacker, always a hacker" it is a mindset, not a hobby, Alissa! Come on! You know it better than me and looking at what you do now, it seems like you are not even trying!
Alissa Knight, senior analyst at Aite Group, discusses her work penetration testing connected cars and the ups and downs of her security career, from getting arrested for hacking as a teenager to becoming a senior security analyst and her upcoming book on hacking modern vehicles. Join us in the fight against cybercrime: https://www.infosecinstitute.com. Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast.
In episode 159 of the Get Published Podcast, Host and 13-Time Bestselling Author Paul G. Brodie interviews Alissa Knight about her author journey and how to post content weekly to your audience.
LeetSpeak with Alissa Knight Episode 10: Artificial Intelligence in Cybersecurity and Interview with Cybraics' Pete Nicoletti & Jon Ticknor In this 10th episode of LeetSpeak, Alissa Knight interviews Pete Nicoletti and Jon Ticknor from Cybraics, a ML powered SIEM delivered as a service for detecting zero day threats
LeetSpeak with Alissa Knight Episode 8: PKI in the Enterprise and Interview with the Strongkey Leadership Team In this 8th episode of LeetSpeak, Alissa Knight interviews Nicole Culver and Arshad Noor of Strongkey to discuss PKI, public key cryptography, HSMs, TPMs, and the death of passwords in the enterprise.
LeetSpeak with Alissa Knight Episode 7: Securing mobile apps against reverse engineering and hacking In this seventh episode of LeetSpeak, Alissa Knight interviews Ken Jochims, Director of Product Marketing for Arxan Technologies and discusses mobile app hardening and hacking
LeetSpeak with Alissa Knight Episode 6: AI Rising: Artificial Intelligence in Cybersecurity In this episode of LeetSpeak, Alissa Knight discusses the operational readiness of Artificial Intelligence (AI) and Machine Learning cybersecurity solutions in the enterprise. This week, she interviews Derick Burton, Information Security Manager for a midsize bank in Bermuda and his first-hand experience and lessons learned from deploying and managing AI cybersecurity solutions in his enterprise environment of 1,000 nodes.
LeetSpeak with Alissa Knight Episode 5: Printer Security: The backdoor into your organization's network In this episode of LeetSpeak, Alissa Knight discusses recent news around printer security, vulnerabilities she and others have leveraged in previous penetration tests to either hack the network through the printer or exfiltrate company sensitive data off of them. She'll also discuss how to hack MFPs and the risk treatment options to mitigate the vulnerabilities that lead to these types of data breaches and network compromises.
LeetSpeak with Alissa Knight Episode 3: Alissa Knight on Gender Dysphoria, Being Transgendered, LGBTQ Issues, and her own startup story Special Guests: Carolina Ruiz, CEO of Latin America for Brier & Thorn Topics Covered: Barriers to leadership positions and seats in the boardroom for women globally, the recent suicide of Kate Spade, advice for women seeking leadership positions... In this third episode of LeetSpeak, I take a temporary detour from the usual conversation on Internet of Things (IoT) and cybersecurity as we close out LGBTQ pride month. In this episode I talk through LGBTQ issues, helping listeners to better understand gender dysphoria, transgender issues, my own experiences as a transgendered woman and trans executive in the workplace, and more about myself in where I grew up and how my story came to be.