appassionato, to bookstodon
@appassionato@mastodon.social avatar

Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner

This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them.

@bookstodon


crowgirl, to random
@crowgirl@hachyderm.io avatar

I have exciting news. My new O'Reilly book Hacker Culture: A to Z (which is already available in paperback and eBook) will be available in audiobook format on January 9th 2024.

You should be able to preorder the audiobook from audiobooks.com, Google Play, Barnes & Noble, and other retailers about 30 days before publication. Which means very soon.

I will share preorder links very soon.

Back cover. Text: "O'REILLY "Few tech books deserve the moniker "page-turner," but Kim Crawley deserves that praise-and more-for Hacker Culture A to Z. Nerds and makers of a certain age will find fun nostalgia on every page, while everyone will discover plenty of new, often overlooked details along the way. Our tech history has such a rich and diverse cast of characters and gadgets. They all spring to life under Crawley's insightful gaze. I'm earnestly hoping for a second volume!" -Marc Loy, Author of Learning Java, 6th Edition Hacker Culture A to Z A FUN GUIDE TO THE PEOPLE, IDEAS, AND GADGETS THAT MADE THE TECH WORLD Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. • Understand the relationship between hacker culture and cybersecurity... "

ai6yr, to random

Why do I get the feeling I need to war drive around the neighborhood to find all the Wi-Fi enabled ovens in the neighborhood, and then run some vulnerability scanners on them?

ai6yr,

Apparently these have been hacked before... (patched, however). Nothing like turning on the gas on your oven remotely while you are sleeping... 😱 https://phys.org/news/2017-10-flaw-hackers-smart-ovens.html

avolha, to ksiazki Polish
@avolha@infosec.exchange avatar
appassionato, to bookstodon
@appassionato@mastodon.social avatar

The Cyber Attack Survival Manual: Tools for Surviving Everything From Identity Theft to the Digital Apocalypse

Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online. As we live more of our lives online, we need to be more aware of the risks we face—and what we can do to protect ourselves.

@bookstodon


appassionato, to bookstodon
@appassionato@mastodon.social avatar

Ransomware and Cybercrime

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies’ cyber offensive capability, said, ‘’Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.’’

@bookstodon




W_P_A, to android
@W_P_A@mastodon.social avatar
appassionato, to bookstodon
@appassionato@mastodon.social avatar

Security in the Cyber Age: An Introduction to Policy and Technology

Explore how cyberspace works, analyze how state and non-state actors exploit vulnerabilities, and discover ways to improve cybersecurity.

@bookstodon



dimi, to humour
@dimi@techforgood.social avatar
dimi, to humour
@dimi@techforgood.social avatar
mraharrison, to edutooters
@mraharrison@mstdn.social avatar

120 years ago, a stage illusionist decided to take a famous scientist down a peg or two, and in the process became arguably the first white-hat hacker. This story is taken from my books How to Teach Computer Science (for computing teachers) and How to Learn Computer Science (for computing students)... Click for more...
http://httcs.online/2023/04/30/the-first-white-hat-hacker/
@edutooters

voxel, to privacy
@voxel@infosec.exchange avatar
omeraltundal, to random
@omeraltundal@infosec.exchange avatar

Human is the weakest link in cyber security chain

andrazaharia, to random
@andrazaharia@infosec.exchange avatar

Why do we need to talk about when there are so many problems to solve in ? 👉 If you've seen me champion empathy around here (and other corners of the web), it's because it plugs into 3 of our essential human needs:

💜 CONNECTION: we all need an emotional bond with someone who pays attention to us and cares about us to maintain our mental (and physical) health. We also need to be part of a community to develop and thrive. Empathy provides that.

💜 VALIDATION: to see someone else recognize our emotions and experiences as valid (and valuable) is essential to feel accepted and seen and/or heard. Knowing we're not the only ones to experience confusion, fear, doubt, and many other perfectly human emotions helps us understand, process, and overcome these blockers.

💜 SAFETY: empathy helps us feel safe enough to persevere in spite of our perceived misgivings. It provides an emotional safety net that gives us the courage to experiment, to trust (ourselves and others), to hope, and to dream.

You can choose to see empathy as a buzzword or dig deeper into its layers to discover the practical, palpable benefits you can draw from it.

What will you choose?

PS: The new season starts tomorrow! :does a tiny happy dance:

atoponce, to random
@atoponce@fosstodon.org avatar

The WebP vulnerability in libwebp is nasty. Here's a fairly comprehensive list of applications affected:

https://gist.github.com/mttaggart/02ed50c03c8283f4c343c3032dd2e7ec

ludothegreat, to random
@ludothegreat@infosec.exchange avatar

& folks, what are your recommended podcasts with video?

Xavier, to random
@Xavier@infosec.exchange avatar

🚨PSA: iOS 17 turns these sensitive location options back on. If you have disabled significant locations as well as adding your location information to your iPhone analytics before upgrading to iOS 17, iOS 17 will turn the options on as shown in the screenshot.

While significant locations remain local on your iPhone, they can be abused as they record detailed information about the locations you visit frequently. iPhone analytics, on the other hand, are shared with Apple. Having your location information included in these analytics reports might have privacy implications, even if the reports don't identify you.

Security experts have always advised to turn these two options off.

Go the Settings app: Privacy & Security ➡️ Location Services ➡️ Scroll down to System Services ➡️ Find these two options and turn them off:

👉 Significant Locations
👉 iPhone Analytics

Re-post and share it with your friends.
You're welcome!


Reposted from X (https://twitter[.]com/mysk_co/status/1705665324035498016)

theomegabit, to random
@theomegabit@infosec.exchange avatar
malwaretech, to random
@malwaretech@infosec.exchange avatar
bsidesorlando, to random
@bsidesorlando@infosec.exchange avatar

Prepare to have your circuits rewired and your data banks updated.

We are proud to announce our keynote speaker is @eljefedsecurit !

Check out our list of speakers and schedule.
https://bsidesorlando.org/schedule/

Don't forget to get your tickets.
https://bsorl.org/reg-23

spaceraser, to random
@spaceraser@fosstodon.org avatar

Hey, everyone in the or space, mostly in the USA,

I’m looking to make a career change from retail sales. Investigating my options. Seeing that there’s usually a minimum requirement of some jobs training.

I’d like to avoid going back to school for a four year degree, if it can be avoided. Do you see people being hired with their only training being these boot camps or technical degrees I’m seeing some places? Should I just consider a 4 year degree as cost of entry here?

ankit_anubhav, to random
@ankit_anubhav@infosec.exchange avatar
dheerajydv19, to random
@dheerajydv19@infosec.exchange avatar

Heyo all, i just joined mastodon to stay active about current trends in OSINT community. People who post OSINT related stuff, comment down please so we can follow each other.

PogoWasRight, to random
@PogoWasRight@infosec.exchange avatar

An inexcusable gap from breach to notification, or an excusable one?

https://www.databreaches.net/an-inexcusable-gap-from-breach-to-notification-or-an-excusable-one/

Repeat after me: "Date of discovery" does NOT mean the date you completed any investigation. It is the date on which you first knew or reasonably should have known that you had a breach of unsecured PHI.

It is not a huge breach as breaches go, but Sightpath Medical's breach notification raises a lot of questions about compliance with HIPAA's Breach Notification Rule. I hope investigates this one.

Botticelli, to random
@Botticelli@infosec.exchange avatar

I went to my first conference this weekend and despite having mild ,
I actually felt super comfortable. What an amazing industry community that I'm looking forward to engaging with more.

I needed to allow myself to go without the pressure of networking or talking to people in order to take that first step. And I see now that without talking to people, you're only getting 1/10 of what makes a conference interesting.

But that's OK! I needed to just be in the room with people and recognize that I can do that without panicking. And my communication skills are real and don't disappear just because it's new people.

I only made it through half the conference, but I'm way more open to networking and going to other conferences now. Next time being open to talking to people and getting the full experience.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines