
Even Thor Couldn’t save “Blackhat”
/
0 Comments
Let’s face it here, the term “Blackhat” is related to hacking but it’s clear they didn’t have anybody on the set that knew what that meant

Cuckoo Malware Analysis by Digit Oktavianto and Iqbal Muhardianto: A Review
I had the opportunity to review and conduct some interesting hands-on examples from Packt Publishing’s “Cuckoo Malware Analysis” by Digit Oktavianto and Iqbal Muhardianto. This book was divided into five intuitive chapters consisting of:

A Book Review of Mobile Security: How to Secure, Privatize, and Recover Your Device
The “Mobile Security: How to Secure, Privatize, and Recover Your Devices” by Tim Speed, Joseph Anderson, Darla Nykamp, Jaya Nampalli and Mari Heiser, published by Packt Publishing contains an abundance of information pertaining to the threats mobile devices are susceptible to as well as providing guidelines on how protect them from the assorted threats.

Win A Free Copy of Packt’s ‘Mobile Security: how to Secure, Privatize, and Recover Your Device’ !
SecurityOrb.com is pleased to announce that we are organizing a giveaway especially for you. All you need to do is just comment below the post and win a free copy of ‘Mobile Security: how to Secure, Privatize, and Recover Your Device’. Three lucky winners stand a chance to win copy of the book. Keep reading to find out how you can be one of the Lucky One.
0
0
SecurityOrb_Staff
https://securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png
SecurityOrb_Staff2013-08-12 10:58:042013-08-12 10:58:04Blackhat USA 2013 Summary – Part 3 of 3
0
0
SecurityOrb_Staff
https://securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png
SecurityOrb_Staff2013-08-12 10:52:102013-08-12 10:52:10Blackhat USA 2013 Summary – Part 2 of 3
0
0
SecurityOrb_Staff
https://securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png
SecurityOrb_Staff2013-08-12 10:51:052013-08-12 10:51:05Blackhat USA 2013 Summary – Part 1 of 3
Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks
A posting from Dark Reading in there Authentication Section: As…

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 3/3
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 2/3
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security. Its aim, in plain terms, is to improve the usability of security features in end user applications.
