Writer, educator, and consultant in cybersecurity; author of three books.
Self-teaching a little security thinking
Detecting a Phish on an iPhone
Online Course in Cloud Security Basics
Life Cycle of a Security Bug
“Eyes Only” Security Marking
WPA2 Packet Frame Format
Ethics and Chatbots
Authentication Chapters Online
Political campaign security
The practical digital library updated
Ross Anderson and another edition of Security Engineering
A Forged “From” Address
Rule #1 for Detecting a Phish
A Mac Hack
Invoice Phishing Campaign
State of the Art Password Cracking
Sen. John McCain, 1936-2018
Interesting Email Scam I Received
Organizing Video Clips for an Online Course
How to Trace an Email Message
HR and Phishing
Already have a WordPress.com account? Log in now.
You must be logged in to post a comment.