Let’s go phishing
This article was written with companies in mind; most of this applies to individuals as well. Most security incidents happen due to phishing, and I… Read More »Let’s go phishing
This article was written with companies in mind; most of this applies to individuals as well. Most security incidents happen due to phishing, and I… Read More »Let’s go phishing
In this blog post, I want to talk about risk management and the concept of threat modeling. Let’s start with some basic math, then dive… Read More »Risk and threat management
Today I want to talk about online privacy concerns. When it comes to online privacy, I tend to take a slightly different road than many… Read More »Online Privacy concerns
In this installment, we’re going to look at different ways you could be separated from your money, which you may later regret. Let’s call these… Read More »Scams, Frauds and other ways to loose your money
If there is one magic silver bullet that will help you maintain your online security, it is critical thinking skills. If you read my previous… Read More »Magic of online security
Definitions Before we dive into the world of online security, let’s start with some definitions. Online Security basics The first thing we need to realize… Read More »Basics of online security
INTRO This post will serve as an ongoing errata page for my book. My plan is to continuously update this post as I discover errors,… Read More »Book Errata