Remove Book Remove InfoSec Remove IoT Remove Passwords
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 358
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. WANG : In leadership roles, I don't know that I think the overall percentage of women in cyber InfoSec is like 22%.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Normally account take overs are due to insecure passwords or recovery options, this is definitely something different.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Anyway I was testing this suite when I happened to randomly strike two keys -- I think it was control and B -- and up popped the password manager, displaying all my test passwords in the clear. Thing was, the manager required its own password, which I had not entered; remember, I had hit only two keys. This was a software flaw.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Anyway I was testing this suite when I happened to randomly strike two keys -- I think it was control and B -- and up popped the password manager, displaying all my test passwords in the clear. Thing was, the manager required its own password, which I had not entered; remember, I had hit only two keys. This was a software flaw.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse. But what about IoT devices? Both involve people getting hurt.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. We get the InfoSec people that were on enterprise systems, we get them that come because they want to learn more about security. Then from there we go to a we're brute forcing username passwords or credentials.

Hacking 52