L0pht (@l0phtheavyind) 's Twitter Profile
L0pht

@l0phtheavyind

Building machines to feed your dreams. Making the theoretical practical since 1992.

ID: 2865688353

linkhttp://www.l0pht.com calendar_today07-11-2014 14:45:56

571 Tweet

7,7K Followers

10 Following

Dennis (@dennisf) 's Twitter Profile Photo

"It was sort of a once in a lifetime opportunity. We also felt like it was something where the hacker community was going to have a voice through us." Weld Pond | Chris Wysopal Thirty Minutes Or Less: An Oral History of the LØpht, Part Three decipher.sc/thirty-minutes… #decipher #deciphersec

Weld Pond | Chris Wysopal (@weldpond) 's Twitter Profile Photo

Today is the 25th anniversary of my testimony to the U.S. Senate as part of a group of 7 hackers from the L0pht. The hearings were titled, "Weak Computer Security in Government: Is the Public at Risk?" (cont)

Today is the 25th anniversary of my testimony to the U.S. Senate as part of a group of 7 hackers from the L0pht. The hearings were titled, "Weak Computer Security in Government: Is the Public at Risk?" (cont)
Weld Pond | Chris Wysopal (@weldpond) 's Twitter Profile Photo

We testified about the risks of insecure software and how it is a major threat to national security and public safety. We addressed the importance of public-private partnerships to tack cybersecurity issues... (cont)

Weld Pond | Chris Wysopal (@weldpond) 's Twitter Profile Photo

the need for better security practices, and how the government needed to do a better job educating organizations and businesses. Cybersecurity was an "everyone" problem that needed help from standards creators, hackers, vendors, governments and businesses. (cont)

Weld Pond | Chris Wysopal (@weldpond) 's Twitter Profile Photo

The hearing was a landmark event in the history of cybersecurity. It was the 1st time hackers testified before Congress & it helped to raise awareness of the risks of insecure software, which was largely unknown at the time More thoughts in my blog post lnkd.in/eAc4X6pC

Space Rogue (@spacerog) 's Twitter Profile Photo

I don’t think I ever realized that the first ever Presidential Cyber Policy was released just days after the L0pht testimony 25 years ago. Coincidence? lawfareblog.com/twenty-five-ye…

Space Rogue (@spacerog) 's Twitter Profile Photo

This was recorded a bit ago but the latest episode of the Alice & Bob Podcast just dropped. I discuss the fascinating origins of the L0pht, and how we made an indelible mark on the industry. podcasts.apple.com/us/podcast/ep-…

Paul Asadoorian @paulasadoorian@infosec.exchange (@securityweekly) 's Twitter Profile Photo

In the latest Vault episode you get to hear the interview I did that one time with several members of the L0pht group and discuss topics such as vulnerability disclosure. Check out all of my podcasts here: buff.ly/43pV6ke (Full interview: buff.ly/3XiEGIf)

Andrew Waite - @Infosanity@infosec.exchange (@infosanity) 's Twitter Profile Photo

Wide awake at silly o’clock. So continuing garden reading trend, this time watching the sun rise with a warning to shepaeds whilst reading Space Rogue’ account of L0pht early years. amzn.to/3qVqjNU Nearly finished, any recommendations for what I read next?

Wide awake at silly o’clock. So continuing garden  reading trend, this time watching the sun rise with a warning to shepaeds whilst reading <a href="/spacerog/">Space Rogue</a>’ account of <a href="/L0phtHeavyInd/">L0pht</a> early years. amzn.to/3qVqjNU

Nearly finished, any recommendations for what I read next?
Carey (@firewalldragons) 's Twitter Profile Photo

On Monday, I'll reminisce about the origins of the Cult of the Dead Cow with Deth Veggie & Omega! We'll talk BBSs, phreaking, textfiles, L0pht, how they chose their hacker handles, #hacktivism, and much more! The Official Pulpit of CULT OF THE DEAD COW Subscribe here: podcast.firewallsdontstopdragons.com

On Monday, I'll reminisce about the origins of the Cult of the Dead Cow with <a href="/DethVeggie/">Deth Veggie</a> &amp; Omega! We'll talk BBSs, phreaking, textfiles, <a href="/L0phtHeavyInd/">L0pht</a>, how they chose their hacker handles, #hacktivism, and much more! <a href="/cDc_Pulpit/">The Official Pulpit of CULT OF THE DEAD COW</a> 

Subscribe here:
podcast.firewallsdontstopdragons.com
Weld Pond | Chris Wysopal (@weldpond) 's Twitter Profile Photo

Discover the extraordinary journey of Window Snyder, a trailblazing cybersecurity pioneer! Her genius was fortifying crucial software and devices we rely on daily, making our digital world safer. techcrunch.com/2023/08/04/win…

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1999: The article "HacK, CouNterHaCk" was published in the New York Times Sunday Magazine. A pretty in-depth story about the hacker collective L0pht, its members, and their pursuits. Many interesting quotes - some a glimpse into 1999; others prophetic. web.archive.org/web/2022022321…

1999: The article "HacK, CouNterHaCk" was published in the New York Times Sunday Magazine. A pretty in-depth story about the hacker collective L0pht, its members, and their pursuits. Many interesting quotes - some  a glimpse into 1999; others prophetic. web.archive.org/web/2022022321…
Ben Rothke (@benrothke) 's Twitter Profile Photo

One of the most influential hacking groups was L0pht. In ‘Space Rogue: How the Hackers Known as L0pht Changed the World’, Space Rogue tells his story & it’s a fascinating one. It’s my RSA Conference #infosec book of the month review. #RSAC rsaconference.com/library/blog/b…