Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirk
In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do ab...
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
Take your career to the next level with Cybrary's online Cyber Security courses. Join the only free cyber security training that can help get you there!
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.
Inventing for the world's largest problems: Pablos Holman at TEDxMidwest -
The mind of a hacker spins in a different direction. Upon encountering normal scenarios, they question how their ability to manipulate it according to their ...
The best defense against hackers is a well-informed development team. Our interactive exercises can teach your team about today's most common security vulnerabilities. %>
This is an open-source version of 'Security Training for Everyone', PagerDuty's internal employee security training, given to all PagerDuty employees as part of our annual security training program.
How To Protect Your Users With The Privacy By Design Framework — Smashing Magazine
In these politically uncertain times, developers can help to **defend their users’ personal privacy** by adopting the _Privacy by Design (PbD)_ framework. These common-sense steps will become a requirement under the EU's imminent data protection overhaul, but the benefits of the framework go far beyond legal compliance. Let’s give credit where credit is due. The global political upheaval of the past 12 months has done more to get developers thinking about privacy, surveillance and **defensive user protection** than ever before. The risks and threats to ourselves, and to our users, are no lo...