Slack - Slack is one of the most compelling platforms to emerge in recent years. Let’s turn those crazy ideas we read about in books into reality. Augmented Reality - With the introduction of ARKit and ARCore, it’s never been easier to build AR experiences. Build something creative in this exciting space. Blockchain / Crypto - You might feel inundated with ICOs and new blockchain-based startups, but where there’s smoke, there’s fire. We’re especially thankful for those that contribute to this category. You’re welcome to build anything (get creative!) or focus in on one of the following categories: Social Impact - Technology in the hands of empathetic, thoughtful makers has the ability to make the world a better place. Everyone will get free access to Ship, our new toolkit to help makers build awesome products, to showcase their project, share updates, and gather feedback from the community along the way. You’ll have the entire month to build something awesome with over $250,000 in prizes awarded to the winners thanks to the support of our awesome friends at AWS, Dribbble, Girls in Tech, Glitch, the Google Assistant, Indie Hackers, Slack, Stripe, and TechCrunch.Īnyone with a computer is welcome to participate, from solo makers to teams of people. □ Unlike traditional weekend hackathons, this will be a month-long event, for anyone in the world to participate online. To further support makers and encourage people to build awesome products, we’re excited to announce the Product Hunt Global Hackathon. While not every product may be a “success” in the traditional sense, we know that the process of building and exploring new ideas is what moves our industry forward and something we continue to encourage at Product Hunt. Their creations are inspiring, useful and sometimes hilarious. Every morning, I wake up to discover new, innovative products created by people around the world, like this side project by 18-year-old Amrith in India to this design tool from a team of two in Ukraine. The perpetrator of a 2020 Twitter hack involving multiple high-profile accounts posed as an IT support operator to trick employees into handing over credentials.I suggested Seth Williams create a playful graphic and here you go! □ IT support hacks can also work in other ways. “Many times an attacker hasn’t popped everything at once,” she says. For instance, if a user makes a request for system access over Slack, send them a reset via their corporate email. Tobac recommends that IT professionals use two forms of communication to confirm an individual’s identity before fulfilling their request. “We have to update the protocols we use for ID verification because when a lot of these protocols were written we were in the office together - we could talk to each other, we could see each other’s faces,” says Rachel Tobac, a hacker and CEO of the vendor SocialProof Security. The switch to remote workspaces has created new ways for cybercriminals to target organizations, though many companies have been slow to adjust their security practices for the new reality. The attack highlights the vulnerabilities created by workplace communication technologies, which have skyrocketed in use during the pandemic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |