Remove Accountability Remove DNS Remove Hacking Remove InfoSec
article thumbnail

Cyber Defense Magazine – November 2020 has arrived. Enjoy it!

Security Affairs

9TH ANNUAL INFOSEC AWARDSNOW OPEN FOR NOMINATIONS WITH AN INCREDIBLE 5 STAR AWARDS DINNER HELD DURING RSA CONFERENCE 2021 IN SAN FRANCISCO, CA, USA. SecurityAffairs – hacking, Cyber Defense Magazine November 2020 ). Click here to read it online in Yumpu. Click here to check out or media kit and market with us, today.

InfoSec 119
article thumbnail

Your Work Email Address is Your Work's Email Address

Troy Hunt

Not just infosec headlines or tech headlines, but the headlines of major consumer media the likes my mum and dad would read. Let's start with a poll: At your place of work, does your employer have the right to access the contents of your corporate email account if necessary? Have an affair."

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Defense Magazine – February 2021 has arrived. Enjoy it!

Security Affairs

9TH ANNUAL INFOSEC AWARDSNOW OPEN FOR NOMINATIONS WITH AN INCREDIBLE SOCIAL MEDIA LIVE BOOST AND VIRTUAL RED CARPET TO CELEBRATE OUR WINNERS, HELD DURING RSA CONFERENCE 2021 IN SAN FRANCISCO, CA, USA. SecurityAffairs – hacking, Cyber Defense Magazine). Click here to read it online in Yumpu. email: marketing@cyberdefensemagazine.com.

InfoSec 103
article thumbnail

Cyber Defense Magazine – March 2021 has arrived. Enjoy it!

Security Affairs

9TH ANNUAL INFOSEC AWARDSNOW OPEN FOR NOMINATIONS WITH AN INCREDIBLE SOCIAL MEDIA LIVE BOOST AND VIRTUAL RED CARPET TO CELEBRATE OUR WINNERS, HELD DURING RSA CONFERENCE 2021 IN SAN FRANCISCO, CA, USA. (You can download a PDF version once you open the page flipping version) Do you like Yumpu, an alternative online flipbook version?

InfoSec 63
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. — Dave Kennedy (@HackingDave) July 15, 2020.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Which brings us back to Aadhaar and some rather unpleasant headlines of late, particularly the likes of The World's Largest Biometric ID System Keeps Getting Hacked. They claim that they're hack-proof. But claiming the service is "hack-proof", that's something I definitely have an issue with. Can you prove otherwise?

Hacking 279
article thumbnail

The Hacker Mind Podcast: Tib3rius

ForAllSecure

Hacking websites is perhaps often underestimated yet is super interesting with all its potential for command injections and cross site scripting attacks. In fact, the word “hack” simply means to take things apart. It’s about challenging out expectations about the people who hack for a living.

DNS 40