article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 359
article thumbnail

Relax. Internet password books are OK

Malwarebytes

Passwords are a hot topic on social media at the moment, due to the re-emergence of a discussion about good password management practices. There’s a wealth of password management options available, some more desirable than others. Others involve syncing passwords with services such as Dropbox. The big book of passwords.

Passwords 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. WANG : In leadership roles, I don't know that I think the overall percentage of women in cyber InfoSec is like 22%. So I learned.

InfoSec 40
article thumbnail

The bad old days

Javvad Malik

We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Yeah, infosec is full of characters. Passwords. I mean take for example passwords – they were a funny thing even back then.

Passwords 113
article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

Sometimes you don’t even need this level complexity as people often provide their full name and email (and other details) when booking tickets for example. That does not mean it is not right sometimes, if the targets have not changed a password in a while, they can still be valid. Did you read those terms and conditions carefully?

Scams 72
article thumbnail

Analysis of the 2020 Verizon Data Breach Report

Daniel Miessler

Verizon’s Breach Report is one of the best infosec reports out there, and I’m always excited when I hear it’s been released. The top malware type is Password Dumper, because it really is about getting those creds. He looks at the key findings and talks about what they might mean to us going forward.

article thumbnail

Burnout: The Hidden Cost of Working in Cybersecurity & Other High Risk Fields

Jane Frankland

In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. This increases the likelihood of making mistakes, such as clicking on phishing links, sharing data in insecure ways, using weak passwords, or not spotting cyber threat patterns.