Phishing Defenses
Phishing behaviors, as observed in the wild.
Phishing behaviors, as observed in the wild.
Threat Modeling for UX Designers with Adam Shostack on Heidi Trost's podcast
Threat modeling doesn't need to be a slow, heavyweight activity!
The timing of updates is not coincidental.
Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I think the workshop was a tremendous success.
[no description provided]
[no description provided]
[no description provided]
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.