Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirk
In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do ab...
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
Let's debunk some common myths around web accessibility. By now you have most likely have heard the term digital accessibility and may have an inkling about what it is— but have you bought into the hype?
Conception numérique responsable. Il est temps de prendre en compte les dimensions sociale et environnementale dès la conception des services numériques.
Take your career to the next level with Cybrary's online Cyber Security courses. Join the only free cyber security training that can help get you there!
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.