article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 358
article thumbnail

Weekly Update 271

Troy Hunt

Coding, IoT'ing, 3D printing and a milestone academic event for Ari: Primary school - done! It's been a busy week with lots of little bits and pieces demanding my attention.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 232

Troy Hunt

There's probably some hints in the range of different things I'm speaking about this week and the book is certainly now consuming a heap of time, but at least I'm doing what I love. Doing text to speech in Norwegian when the beer fridge is left open is one of the most fun IoT things I've done ??

article thumbnail

Weekly Update 231

Troy Hunt

I'm talking (somewhat vaguely) about the book I'm working on, how Facebook has nuked all news in Australia (which somehow means I can't even post a link to this blog post there), yet more data breaches, the awesome Prusa 3D printer I now have up and running and a whole heap more about the IoT things I've been doing.

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

There is little you can do in the event we experience widespread DDoS attacks, but one tip is to buy a good book series or a few board games since it might take a while to get the internet working again. Never buy a device that doesn’t allow you to set a long and strong password. password, 123456, qwerty, etc.

Passwords 245
article thumbnail

A 3-Tiered Approach to Securing Your Home Network

Daniel Miessler

Most home networks get broken into through either phishing or some random device they have with a bad password. It’s usually a password that was never configured or never changed from the default. Use a password manager to make and store good passwords that are different for every account/device.

Passwords 255
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Haddix continues to provide his insights while serving as the Head of Security and Risk Management for Ubisoft. Parisa Tabriz | @laparisa.