Search
Results
AI makes phishing 4.5x more effective, Microsoft says • The Register
Death to one-time text codes: Passkeys are the new hotness • The Register
[https://www.theregister.com/2025/12/06/multifactor_authentication_passkeys/] - - public:mzimmerm
PHISHING IS THE BIGGEST SECURITY THREAT: PHISHER MASKED AS THE ORIGINAL SITE ASKS YOU TO GIVE HIM YOUR KEY. PASSKEYS REMOVE PHISHING, ORIGINAL SITE NEVER ASKS YOU TO ENTER ANYTHING. Pre-passkeys security: 1. what you know (password or passcode) 2. what you own (device or MFA software generating number that is sync-valid with server for 30s) 3. what you are (fingerprint, face) Passkey only needs 2 but with important distinction: user is NEVER asked to type anything to any prompt, as that is subject to phishing)
All Free Dumps
Publications | CSRC
Nine HTTP Edge Cases Every API Developer Should Understand | Dochia CLI Blog
Sign in with a passkey instead of a password - Google Account Help
(62) What Is a Passkey? - YouTube
อย่าโอนก่อนเด็ดขาด! ระวัง 6 กลโกงยอดฮิตจากมิจฉาชีพออนไลน์ | เดลินิวส์
It's more important than ever to protect yourself online, but a VPN won't do you much good — Here are 5 things that will
[https://www.xda-developers.com/more-important-ever-protect-yourself-vpn-not-good/] - - public:mzimmerm
Register Domain by Bitcoin | Buy Domain with Crypto Payment | Buy Web Domain
Gaia-X and OpenID Connect - Gaia-X: A Federated Secure Data Infrastructure
European Identity Insights - Benefits of Reusable Strong Identity
[https://www.ubisecure.com/identity-platform/european-reusable-strong-identity/] - - public:mzimmerm
'ตำรวจไซเบอร์' เตือนภัย 4 เว็บไซต์อันตราย ใช้กลอุบายพูดคุยเชิงชู้สาว ก่อนชวนให้เทรดหุ้น | เดลินิวส์
#UnplugTrump: Mach dich digital unabhängig von Trump und Big Tech • Kuketz IT-Security Blog
[https://www.kuketz-blog.de/unplugtrump-mach-dich-digital-unabhaengig-von-trump-und-big-tech/] - - public:mzimmerm
Anti - surveillance apps
Tails - Secure live on the internet
Packet Builder for Network Engineer - Colasoft
Cyber Security Tools | SANS Institute
Security Engineering - A Guide to Building Dependable Distributed Systems
Cyber Security Body of Knowledge (CyBOK) - NCSC.GOV.UK
Online Bachelor’s Degree in Cyber Security | EC-Council University
[https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/] - - public:stevetao
Wyze Cam v4 | 2.5K HDR, Indoor/Outdoor, Wired Security Camera | Wyze
10 Useful Digital Forensics Software in 2025
Top 7 Computer Forensics Tools for Digital Evidence Collection | Infosec
[https://www.infosecinstitute.com/resources/digital-forensics/7-best-computer-forensics-tools/] - - public:stevetao
Wordlists in Cybersecurity: RockYou 2024 Includes 10 Billion Stolen Passwords
[https://www.packetlabs.net/posts/wordlists-in-cybersecurity-rockyou-2024-includes-10-billion-stolen-passwords/] - - public:stevetao
encryption - Should we sign-then-encrypt, or encrypt-then-sign? - Cryptography Stack Exchange
[https://crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign] - - public:stevetao
Examples of Defense in Depth: The Stealth Cybersecurity Essential | Learning Tree
[https://www.learningtree.com/blog/defense-in-depth-the-stealth-cybersecurity-essential/] - - public:stevetao
Great “Defense-in-Depth“ InfoGraphic
Defense-in-Depth - Essential Guide to Election Security
12 วิธีการสร้างและวิเคราะห์ Threat Modeling
Biometric security jargon: CER, EER, FRR, FAR
Threat Modeling: 12 Available Methods
What is Cyber Threat Modeling | Importance of Threat Modeling | EC-Council
Types of Security Controls - InfosecTrain
SABSA Executive Summary - The SABSA Institute
SIFT Workstation | SANS Institute
Malware Analysis: Tips & Tricks Poster | SANS DFIR
How You Can Start Learning Malware Analysis | SANS Institute
Navigating the Layers of the Internet: Unveiling the Surface, Deep, and Dark Web
[https://www.insightindia.com/articles/navigating-the-layers-of-the-internet-unveiling-the-surface-deep-and-dark-web-9jt312xq.html] - - public:stevetao
