How did you get into online security?

My background is in software development, later specializing in system architecture.

What are the most common security vulnerabilities you uncovered?

Have I Been Pwned Alerts You to Data Breaches Even When the Websites Won’t

But companies spend a lot of money on data protection.

How is it so easily compromised?

It’s an interesting thing.

Article image

Then there is the question of when security is applied.

Many organizations still have their software built (makes air quotes!

), finished, and tested by a vendor, and only apply security once its delivered.

Article image

I mean that’s just a terrible way to do security.

I want to help companies avoid that vulnerability in the first place.

How do companies know when they’ve been breached and what data has been stolen?

Article image

(Laughs) Well, very often, companies know they’ve been breached when I tell them!

Think of Sony Pictures.

What throw in of data are hackers after?

Article image

Depending on their motives, anything on the internet is a target.

But there’s plenty of people out there, mostly kids, that only want a trophy.

How does stolen data impact companies and individuals?

Article image

It depends on the throw in of data.

For Sony Pictures, it was unreleased movies which is valuable intellectual property.

Credentials can be used to break into accounts, for sending spam, and for very targeted phishing.

Article image

Does a company have to notify individuals of data breaches?

That depends on your jurisdiction.

Under the GDP in Europe, the guidelines are much more stringent.

Article image

Why did you start Have I Been Pwned, and what service does it provide?

Another thing I found curious was that a lot of people who had been in data breaches were unaware.

That was the genesis for Have I Been Pwned.

Article image

How do you acquire breached databases?

Initially, I went out and grabbed publicly available information.

It does sort of beg the question you know who are these people?

Article image

Are they the bad guys?

Are they people who are just trading information?

The reality of it is it’s a bit of everything.

Article image

What is a paste?

A paste is text which is literally just pasted onto a website.

What actions do you recommend for an individual whose data has been stolen?

Article image

It really depends on the nature of the data.

A password manager is a good tool to make them all unique.

If it’s a password on just that single site, its a lot easier.

Article image

Additionally, once sites are aware of a data breach, they usually reset all passwords anyway.

If it’s something more personal like a credit card, go ahead and cancel the card.

What is the Hack Yourself First workshop?

Article image

Its designed to help software developers, sysadmins, IT pros, etc.

understand how their security vulnerabilities are exploited so they can better protect themselves.

yo, comment on how to improve this article.

Article image

Article image