Was Your Data Leaked Last Year?
167 million LinkedIn user account details are currently for sale on the Dark Web marketplace.
Unfortunately this is just one instance of cyber crime in 2016. For further evidence check out TheHackerNews article: Top 4 Data Breaches Reporting in the Last 24 Hours. There’s no industry, no organization and no classification of software that is immune to the predatory antics of hackers. Bottom line: Software security is a big deal and not all developers know how to properly secure users.
To combat this issue, we are excited to announce the arrival of our 2016 Guide to User Data Security. The guide compiles everything our development team knows about server and application security and delivers step-by-step code to help you secure your user data. It covers key concepts such as server architecture, firewalling, intrusion detection, password security, social hacks, SQL injections and more.
Let’s Get Started
You can read the full guide online here: /guides/2016-guide-to-user-data-security
Or you can download our free ebook by clicking here: /resources/2016-guide-to-user-data-security.pdf
TL;DR
If you would rather not read the entire guide to security (we know it’s long!) check out our Github project created around this guide. The project contains a set of scripts you can execute from your local computer to secure a remote server.
Find our Github project here: https://github.com/inversoft/2016-security-scripts
Hackers Welcome
In order to ensure everything in this guide is correct, we wrote a simple application to go with it. The code is open sourced and the application has been deployed to a couple of Linode servers.
As an added bonus we’re giving away a new 15” fully loaded MacBook Pro to anyone that can breach our security. Yes, that’s right. Since this guide is designed to prevent a hacker from gaining access to the full user database, we will be giving the prize to anyone that can prove access to our user database. To win the prize you must accomplish one of the following hacks or something similar:
- Gain access to one of the servers our application is running on
- Prove an exploit that would allow retrieval of all user data (via an application exploit or something similar)
To make your lives easier, below are the IP addresses for both of our servers:
- Application Server – 192.81.133.144
- Database Server – 45.56.92.87
And finally the front-end of our application lives here: https://hackthis.inversoft.com
If you find an exploit or gain access to our servers, send us an email at [email protected] so that we can verify it and send you the MacBook.
More information regarding the app and contest can be found at the beginning of the guide. If you have any questions, feel free to comment below.
Hack On!
