Remove Book Remove Hacking Remove InfoSec Remove Passwords
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 358
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. It’s about challenging our expectations about the people who hack for a living. That is, until Chenxi Wang spoke up.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis of the 2020 Verizon Data Breach Report

Daniel Miessler

Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. 45% of breaches involved Hacking. Hacking, social, and malware have fallen the most. The top malware type is Password Dumper, because it really is about getting those creds.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

In the book The Art of Invisibility , I challenged my co author Kevin Mitnick to document the steps needed to become invisible online. I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. Vamosi: Within InfoSec there's an informal use of AppSec as well.

Hacking 52
article thumbnail

Burnout: The Hidden Cost of Working in Cybersecurity & Other High Risk Fields

Jane Frankland

In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. This increases the likelihood of making mistakes, such as clicking on phishing links, sharing data in insecure ways, using weak passwords, or not spotting cyber threat patterns.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

So what if you accidentally forget the password? We’ve all been there-- locked out of some account because we can’t remember the clever password we used. All of which speaks to the power of hacking. It's about challenging our expectations about the people who hack for a living. And you’re right.