Hack A Cryptocurrency Wallet Filled With Bitcoin to Get Hired By A Cybersecurity Firm

2021-1-20 00:18

Red Balloon Cyber Security Company is using a unique way to get their next recruits. The company asks prospective candidates to crack an encrypted hard drive before they are offered the opportunity to work with the security firm.

According to the company’s description, anyone with “the skills and passion” to crack the hard drive will be offered 0.1337 Bitcoin (BTC) or about $4,900 as of press time.

Any applicant who decrypts the hard drive and claims the BTC funds is asked to buy a ticket to travel to New York for the recruitment process.

“You have to do a somewhat unusual technical interview: unlocking a hard drive with Bitcoin,” the cybersecurity firm stated.

A Unique Recruitment Method that Brings Result

The Chief executive officer of Red Balloon, Ang Cui, commented on the strange recruitment process by saying that his company is one of the very few firms that use it to recruit its workforce.

According to him, the firm is taking such a method because it is a small company and doesn’t have enough human resources to spend on sorting and going through each resume. So, the idea is to use a smart and effective method to recruit a specialized tech expert group.

The Recruitment Method Records a 1% Success Rate

Cui added that the security firm has sent out the test invitation to anyone interested in the advertised position. He also said only very few persons could scale through the interview, pointing out that the success rate was just 1%.

Red Balloon added 6 people to its workforce, making it 29 employees presently working in the firm. The cybersecurity firm was founded in 2011 and had been using this strange interview method to recruit some of its workers for some time.

A crypto enthusiast recently claimed that he received such invitation and instructions to get back Bitcoin five years ago on Twitter.

Some others also said Red Balloon had been known to use such a recruitment method. Some of them said as part of the Decon Hacker Conference in 2017; the security firm asked programmers to decrypt hard drives with Bitcoin.

Last month, Red Balloon security appointed David Doggett as a senior strategist for its industrial market. As a team senior, his recruitment method was probably not through the hard drive cracking task.

The security firm claims it’s a leading developer of firmware-based security systems that protect embedded devices, including automation systems and electrical systems, from different potential cyber-attacks.

The company’s flagship product, Symbiote Defense, is a defense system designed for embedded devices.

Red Balloon has lots of other products that help customers keep their security systems safe from unwanted exploitation. This explains why the firm uses the unique method of hard drive encryption to recruit its new workforce.

The post Hack A Cryptocurrency Wallet Filled With Bitcoin to Get Hired By A Cybersecurity Firm first appeared on BitcoinExchangeGuide.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

GET Protocol (GET) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $3.6049
Капитализация $0 Rank 99999
Цена в час новости $ 0.2766 (-100%)

get security company firm encrypted asks prospective

get security → Результатов: 126


TRON Users get TronLink Browser Extension for Bitcasino Deposits and Withdrawals

Expanding on an already bustling e-gaming ecosystem, Bitcasino has integrated the TronLink browser extension to its platform, granting greater accessibility and security for TRON (TRX) users. E-Gaming and Crypto As Bitcoin and cryptocurrencies overall have risen in value and popularity over the past few years, the new digital economy has attracted swathes of users, spurring […] The post TRON Users get TronLink Browser Extension for Bitcasino Deposits and Withdrawals appeared first on NullTX.

2020-3-28 11:10


Understanding PLONK

Special thanks to Justin Drake, Karl Floersch, Hsiao-wei Wang, Barry Whitehat, Dankrad Feist, Kobi Gurkan and Zac Williamson for review Very recently, Ariel Gabizon, Zac Williamson and Oana Ciobotaru announced a new general-purpose zero-knowledge proof scheme called PLONK, standing for the unwieldy quasi-backronym “Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge”.

2019-9-24 04:03


TikTok has been flooded by scammers promoting adult sites

TikTok has been inundated by a slew of scammers seeking to take advantage of its quickly growing userbase, which surpassed 1 billion downloads in February 2019. Security firm Tenable has discovered scammers are leveraging old tactics to get users to sign up for adult services, impersonate popular social media personalities, and artificially boost likes and follower counts.

2019-8-14 18:04


Crypto Land Looks on as Wall Street Suffers Another Security Breach

Just as monetary policymakers couldn’t appear to be more hypocritical by singling out the emerging cryptocurrency industry for being too loosey-goosey, fate has stepped in. When things seemingly couldn’t get any worse for Deutsche Bank, the Wall Street firm is now troubleshooting a possible security breach involving sensitive client information, according to a report in […] The post Crypto Land Looks on as Wall Street Suffers Another Security Breach appeared first on CCN Markets

2019-7-29 20:15


Фото:

Microsoft Azure experts are averaging $130K a year; get their skills for $19

Knowing how to use Azure, then construct, grow and secure a truly scalable cloud network is the heart of this training bundle. After getting familiar with the platform, your Azure training will take you through building a system infrastructure, installing security measures to maintain protection and just the right steps to take to figure out why any facet of your system isn’t working the way you expected.

2019-6-23 00:30


Sidechains vs Plasma vs Sharding

Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.

2019-6-14 04:03