surchaw , to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
@surchaw@mas.to avatar
EDPSciences , to AcademicChatter group
@EDPSciences@masto.ai avatar

| Security and Safety
Special Issue on “Security and Safety in Network Simulation and Evaluation”

Guest editors from



and

📅Submission deadline – 30 June 2024
➡️ bit.ly/45vXyHO


@ScienceScholar @academicsunite @academicchatter

EDPSciences , to AcademicChatter group
@EDPSciences@masto.ai avatar

| Security and Safety "Secure and efficient Covert Communication for blockchain-integrated SAGINs"
Weijia Li, Yuan Zhang, Xinyu He and Yaqing Song

➡️ bit.ly/3VGMFjr



@ScienceScholar @academicsunite
@academicchatter

appassionato , to bookstodon group
@appassionato@mastodon.social avatar

Social Engineering in Cybersecurity; Threats and Defenses by Gururaj H L & Janhavi V & Ambika V, 2024

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks.

@bookstodon



ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    Combatting Cyber Terrorism - a Guide to Understanding the Cyber Threat Landscape and Incident by Richard Bingley, 2024

    This book discusses: definitions of cyber terrorism; ideologies and idealisations that can lead to cyber terrorism; how threat actors use computer systems to diversify, complicate and increase terrorist attack impacts; the role of Big Tech and social media organisations such as X (formerly Twitter) and Instagram.

    @bookstodon


    ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    Hacked: The Secrets Behind Cyber Attacks by Jessica Barker, 2024

    In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.

    @bookstodon




    ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime by Hari Ravichandran, 2023

    This book teaches how we can put our families' online safety on autopilot and regain our peace of mind. It provides families with the tools and knowledge they need to create a personalized, proactive defense against cybercriminals.

    @bookstodon



    ALT
  • Reply
  • Loading...
  • debbryant , to Python
    @debbryant@fosstodon.org avatar

    tl;dr – Apache Software Foundation, Blender Foundation, OpenSSL Software Foundation, PHP Foundation, Rust Foundation, and Eclipse Foundation have jointly announced their intention to collaborate on the establishment of common specifications for secure software development based on existing open source best practices. https://eclipse-foundation.blog/2024/04/02/open-source-community-cra-compliance/ @python @rust @EclipseFdn @opensslannounce @Blender

    Scraft161 , to Linux
    @Scraft161@tsukihi.me avatar

    Hardware security key options?

    I've been thinking about getting a hardware security key and have heard of yubikey before; but I want to see what my options are and if they are worth it in your opinion.
    My current setup is a local KeePassXC database (that I sync between my PC and phone and also acts as TOTP authenticator app), I know that KeePass supports hardware keys for unlocking the database.

    I am personally still of the belief that passwords are the safest when done right; but 2FA/MFA can greatly increase security on top of that (again, if done right).
    The key work work together with already existing passwords, not replace them.

    As I use linux as my primary OS I do expect it to support it and anything that doesn't I will have to pass on.

    PS: what are the things I need to know about these hardware keys that's not being talked about too much, I am very much delving into new territory and want to make sure I'm properly educated before I delve in.

    @linux @technology @technology @privacy

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines