article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 363
article thumbnail

More on My AI and Democracy Book

Schneier on Security

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. Remember, the goal here is for a title that will make a potential reader pick the book up off a shelf, or read the blurb text on a webpage. Background: Getting Hacked 24. At this point, we would like feedback on titles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Trespass Law

Schneier on Security

But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing. This particular hack will be adjudicated in court. It’s not an example I discuss in my new book , but it’s similar to many I do discuss.

Hacking 291
article thumbnail

Hacking the High School Grading System

Schneier on Security

Interesting New York Times article about high-school students hacking the grading system. ” It’s a basic math hack. I know this is a minor thing in the universe of problems with secondary education and grading, but I found the hack interesting. What’s not helping? A teacher from Chapel Hill, N.C.,

Hacking 315
article thumbnail

Hacking the Layoff Process

Schneier on Security

My latest book, A Hacker’s Mind , is filled with stories about the rich and powerful hacking systems, but it was hard to find stories of the hacking by the less powerful. Here’s one I just found.

Hacking 279
article thumbnail

Hacking Pickleball

Schneier on Security

My latest book, A Hacker’s Mind , has a lot of sports stories. Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly break the rules. So, how do we address these situations, and close those loopholes? We make new rules that specifically address the loophole action.

Hacking 263
article thumbnail

Kevin Mitnick Hacked California Law in 1983

Schneier on Security

Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book , which he partially recounts his 2012 book, Ghost in the Wires.

Hacking 354