So, here’s something that blew my mind: I decided to test Google’s NotebookLM AI tool. I casually uploaded the URLs for my LinkedIn page and my blog, not expecting much more than a basic summary. After about 3–4 minutes of AI whirring away, I had…
All in Reviews
So, here’s something that blew my mind: I decided to test Google’s NotebookLM AI tool. I casually uploaded the URLs for my LinkedIn page and my blog, not expecting much more than a basic summary. After about 3–4 minutes of AI whirring away, I had…
Last year, Humble Bundle teamed up with the great tech publisher, No Starch Press, to offer deeply discounted hacking ebooks for as little as one dollar with the Hacking 101 By No Starch Press Humble Bundle of ebooks. This year, on Giving Tuesday, No Starch Press has a new Hacking Book Bundle. The regular cost for the ebooks is more than $800 but you can get all of these ebooks for thirty dollars or just a few of the ebooks for as little as one dollar.
Annual cybersecurity reports are a rich resource of statistics and information for cybersecurity professionals, academics, journalists and anyone who is interested in cybersecurity. Below is a categorized list of many of these reports…
There is no doubt that Google changed the world of the search engine and nothing made the resources of the Internet as accessible as Google. While it has over 90% of the global search engine market, some people have privacy concerns with using Google. This article provides an overview of those privacy concerns and shares some alternatives to using the search engine giant…
In late 2013, after the Adobe data breach, Australian cybersecurity expert, Troy Hunt, created the free web service, HaveIBeenPwned (HIBP), “as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or ‘pwned’ in a data breach.”
What does “pwned” mean? In this context, it basically means that…
Annual cybersecurity reports are a rich resource of statistics and information for cybersecurity professionals, academics, journalists and anyone who is interested in cybersecurity. Below is a categorized list of many of these reports…
“Voting is our capability to have a peaceful transfer of power. If you don’t have that, the alternatives are revolutions.” - Harri Hursti
Last week, HBO released Kill Chain: The Cyber War on America's Elections , a documentary that covers a 15-year analysis of voting machines in the United States. Many of the voting machines used in U.S. elections are vulnerable to attack and they are being targeted by nation states and other threat actors. Follow cybersecurity expert Harri Hursti in the HBO Documentary Kill Chain: The Cyber War on America's Elections , as he explains and demonstrates the weaknesses in many voting machines. In the documentary, Hursti is described as, “one of the world’s top experts on hacking techniques and voting security. For decades, he has been investigating vulnerabilities in U.S. election systems.” states the documentary. In addition to Hursti, the film features an impressive roster of cybersecurity experts including, Jeff Moss, Matt Blaze, Sandy Clark, and Mikko Hypponen, to name a few.