Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner
This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them.
I have exciting news. My new O'Reilly book Hacker Culture: A to Z (which is already available in paperback and eBook) will be available in audiobook format on January 9th 2024.
You should be able to preorder the audiobook from audiobooks.com, Google Play, Barnes & Noble, and other retailers about 30 days before publication. Which means very soon.
Why do I get the feeling I need to war drive around the neighborhood to find all the Wi-Fi enabled ovens in the neighborhood, and then run some vulnerability scanners on them? #wifi#oven
The Cyber Attack Survival Manual: Tools for Surviving Everything From Identity Theft to the Digital Apocalypse
Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online. As we live more of our lives online, we need to be more aware of the risks we face—and what we can do to protect ourselves.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies’ cyber offensive capability, said, ‘’Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.’’
Why do we need to talk about #empathy when there are so many problems to solve in #cybersecurity? 👉 If you've seen me champion empathy around here (and other corners of the web), it's because it plugs into 3 of our essential human needs:
💜 CONNECTION: we all need an emotional bond with someone who pays attention to us and cares about us to maintain our mental (and physical) health. We also need to be part of a community to develop and thrive. Empathy provides that.
💜 VALIDATION: to see someone else recognize our emotions and experiences as valid (and valuable) is essential to feel accepted and seen and/or heard. Knowing we're not the only ones to experience confusion, fear, doubt, and many other perfectly human emotions helps us understand, process, and overcome these blockers.
💜 SAFETY: empathy helps us feel safe enough to persevere in spite of our perceived misgivings. It provides an emotional safety net that gives us the courage to experiment, to trust (ourselves and others), to hope, and to dream.
You can choose to see empathy as a buzzword or dig deeper into its layers to discover the practical, palpable benefits you can draw from it.
🚨PSA: iOS 17 turns these sensitive location options back on. If you have disabled significant locations as well as adding your location information to your iPhone analytics before upgrading to iOS 17, iOS 17 will turn the options on as shown in the screenshot.
While significant locations remain local on your iPhone, they can be abused as they record detailed information about the locations you visit frequently. iPhone analytics, on the other hand, are shared with Apple. Having your location information included in these analytics reports might have privacy implications, even if the reports don't identify you.
Security experts have always advised to turn these two options off.
Go the Settings app: Privacy & Security ➡️ Location Services ➡️ Scroll down to System Services ➡️ Find these two options and turn them off:
👉 Significant Locations
👉 iPhone Analytics
Re-post and share it with your friends.
You're welcome!
I’m looking to make a career change from retail sales. Investigating my options. Seeing that there’s usually a minimum requirement of some jobs training.
I’d like to avoid going back to school for a four year degree, if it can be avoided. Do you see people being hired with their only training being these boot camps or technical degrees I’m seeing some places? Should I just consider a 4 year degree as cost of entry here?
Heyo all, i just joined mastodon to stay active about current trends in OSINT community. People who post OSINT related stuff, comment down please so we can follow each other. #OSINT#SOCMINT#cybersecurity
Repeat after me: "Date of discovery" does NOT mean the date you completed any investigation. It is the date on which you first knew or reasonably should have known that you had a breach of unsecured PHI.
It is not a huge breach as breaches go, but Sightpath Medical's breach notification raises a lot of questions about compliance with HIPAA's Breach Notification Rule. I hope #HHSOCR investigates this one.
I went to my first #cybersecurity conference this weekend and despite having mild #agoraphobia,
I actually felt super comfortable. What an amazing industry community that I'm looking forward to engaging with more.
I needed to allow myself to go without the pressure of networking or talking to people in order to take that first step. And I see now that without talking to people, you're only getting 1/10 of what makes a conference interesting.
But that's OK! I needed to just be in the room with people and recognize that I can do that without panicking. And my communication skills are real and don't disappear just because it's new people.
I only made it through half the conference, but I'm way more open to networking and going to other conferences now. Next time being open to talking to people and getting the full experience.