Remove story how-to-make-better-coffee-at-home
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

When I wrote about how I deal with online abuse, it was off the back of some pretty nasty stuff. When I wrote about how I deal with online abuse, it was off the back of some pretty nasty stuff. That's why we're publishing today; to get this story about the earlier phases of my life out before the next phase begins.

InfoSec 359
article thumbnail

Pick Your Vishing Avatar

Security Through Education

We have done this so we can better understand our own strengths, as well as learn from one another. I have also thought through most potential conversation stoppers and have an idea of how I will respond to them. I’ve already checked my caller ID settings three times to make sure they are correct and have probably made a test call.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

In this episode, I'm going to discuss how hard it is to be absolutely invisible online. How there are always breadcrumbs and fingerprints left behind that could potentially identify you. I mean, there are so many positive stories about people who are hacking for a living and doing good things because of it. There are a lot.

Hacking 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

How then does one start securing it? The question is, who is hacking the internet of things today, and how does one even get started? So far on the hacker mind, I've talked about Capture the Flag bug bounties and how to become a pen tester. Vamosi: I once lived near a large urban park. Funny thing.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

How then does one start securing it? The question is, who is hacking the internet of things today, and how does one even get started? So far on the hacker mind, I've talked about Capture the Flag bug bounties and how to become a pen tester. Vamosi: I once lived near a large urban park. Funny thing.

IoT 52
article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? For instance, how do we interact with each other again? To learn more about what we can do better. Let's take a moment and consider how we can emerge from our quarantine and really do this right.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

So for a young, streetwise petty thief who wanted to make a big score, he needed to up his game. And if that means a bad actor can create a wireless key for your new Tesla, that price is pretty steep. At CanSecWest 2022, researcher Martin Herfurt announced a new tool, TeslaKee.com , which he hopes prevents wireless key attacks from happening.

Hacking 52