![]() ![]() We were proud of it, and we brag but on Twitter, and now we're fixing some things. Like it doesn't have an admin takeover function.īP But then we looked into it, and we've got some stuff we need to fix. Stack was kind of proud that it doesn't, right. PF Oh, yeah, we don't have one of those admin tools. ![]() SC Yeah, it's really, you know, I think every team was like, Hey, we don't do this, do we? At work? And like the rest of the computer industry that caused us to suddenly think about security for the first time in about two years. PF What I love is they finally, someone finally found a way to pay for Twitter's product, you know, like non advertised? PF On the Discord servers where Ben spends most of his time. Greed apparently.īP Wait, but I've heard speculation now that maybe the Bitcoin scam was just the front and they were they were mining the DMs the whole time. PF Such low stakes, they could have started a war but no. And then they were able to take over those accounts and set up these Bitcoin scams. Someone had access to these admin panels and was selling the ability to sort of rewrite the recovery email address so that you could take over the account and someone seems like they paid for access to the whole admin account, and once they had access to the account, they could turn off two-factor authentication so that people weren't getting text messages when these emails were being reset. ![]() My understanding is that there was, it seemed like it was somewhat of an inside job, right. PF So wait, Rachel, can you describe the Twitter hack? RT Hey, guys, so nice to be able to chat with you this morning. So last week, as we all know, there was a big hack on Twitter, and I thought it would be great to have her on to talk to us about big hacks. She is a product manager at Fullstack Academy and focuses on what their cybersecurity program. Sara, you want to introduce our guests today? Anyway, that's not why we're here today.īP Yeah, yeah. And then every now they'll catch me looking at YouTube. They come up behind me with the pandemic and watch me work. That's, that's that's what my kids asked me. PF But you're in something cooler, which is marketing for Stack Overflow, man. He's think you're, he thinks you're like a stunt man in the Marvel movies.īP Yeah, he thinks I'm he thinks I'm in demolition or something. And I'm like, yeah, we make things fall over. Because he loves chaos, you know? So he's like, oh, it means it's breaking. My son actually loves Stack Overflow, the the name and the logo on the tee-shirt. I'm Sara Chipps and I'm here with my co-hosts, Ben popper and Paul Ford. SC Hello, everyone, and welcome to the Stack Overflow podcast. Try out their online Nickle query tutorial to see how easy it is to get JSON data back from a select statement. ![]() It's easy for developers to use, supports mobile development and offers SDKs for Java. Couchbase combines a memory first design built for high performance with a SQL friendly query language called Nickle that accesses key values in JSON documents for flexibility. It's unique because it was formed by the collision of two ideas from different original projects. Rachel Troy This could have been your future, Sara.īen Popper Couchbase is an enterprise class, multi-cloud to edge, NoSQL database architected on top of an open source foundation. īen Popper That's, that's every programmers novel starts that way. Seeing what was possible with the MySpace platform, which sounds like the beginning of my story. Sara Chipps It's a story of a young hacker that got carried away. Remember, when in doubt, if you absolutely need to erase all data off a drive, a plasma cutter will always come in handy. This week, as part of our security theme, we skipped the lifeboat, and picked this gem from our Information Security Stack Exchange. You can find Rachel here or email her- rachel dot troy at fullstackacademy dot com. If you want to learn more about the Fullstack Cyber Bootcamp, you can check it out here. It introduced a mainstream audience to the concept of ransomware and, because of the impact it had on critical hospital equipment, showed just how far software has embedded itself into our society. If any hack made its way into the mainstream consciousness over the last decade, it was WannaCry. As Rachel points out, lots of hackers start out as experimenters, naturally curious coders who enjoy learning the rules and seeing how far they will bend before they break. No list of great hacks would be complete without the Samy worm that ran amok on Myspace back in 2005. This week we sit down to chat with Rachel Troy, a Product Manager at Fullstack Academy working on their Cyber Security bootcamp program. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |