upcarta
Sign In
Sign Up
Explore
Search
Computer security
Follow
34
Followers
Most Recommended
Recent Content
Most Recommended
Article
Podcast episode
Tweet
Video
Book
Paper
Website
Blog
Course
Channel
Podcast
Series
Documentary
Book
Apr 1, 2008
Security Engineering: A Guide to Building Dependable Distributed Systems
by
Ross J. Anderson
Post
Add to Collection
Mark as Completed
Book
Feb 28, 2021
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
by
Heather Adkins
Post
Add to Collection
Mark as Completed
Tweet
Mar 5, 2023
๐งต 1) Nostr is ๐, but there are limitations and serious risks associated with using Nostr for your identity. Let's take a closer look at what the issues are, why it needs to be solved and why using Nostr for identity can increase the risk of security
by
Level39
Post
Add to Collection
Mark as Completed
Series
Sep 15, 2022
HACKING GOOGLE
by
Google
Post
Add to Collection
Mark as Completed
Book
Feb 9, 2021
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by
Nicole Perlroth
Post
Add to Collection
Mark as Completed
Book
Jan 15, 2019
Habeas Data: Privacy vs. the Rise of Surveillance Tech
by
Cyrus Farivar
Post
Add to Collection
Mark as Completed
Article
Jun 7, 2023
Leaks and Breaches for OSINT
Post
Add to Collection
Mark as Completed
Tweet
Jun 6, 2023
30% is the average success rate of phishing attacks according to some reports! Do you know that you can be one of those victims at any time? Here's a list of tips to help you assess the legitimacy of an email: ๐ twitter.com/hasan_3wada/status/1666
by
Hasan Awada
Post
Add to Collection
Mark as Completed
Tweet
May 20, 2023
In programming, security is essential. Here are 8 simple but effective strategies for API development:
by
Nikki Siapno
Post
Add to Collection
Mark as Completed
Tweet
May 14, 2023
3. Munger on Envy Envy is the worst negative-sum game. 1. The envious person is miserable 2. The envied person is under attack It's a virus of the mind that eats joy from everyone involved. twitter.com/george__mack/status/1657787521517117440/phot
by
George Mack
Post
Add to Collection
Mark as Completed
Tweet
May 4, 2023
Last night, I fell in love with a cyber squatter. This dude did it all - some homework on me, some false urgency, some flattery. Seriously, I want to be in business with him. Screenshots follow. This dude has skills - I'm seriously impressed.
by
Jon Matzner
Post
Add to Collection
Mark as Completed
Article
Apr 17, 2023
Revisiting CVE-2017-11176 | Bluefrostsecurity
by
Nils Ole Timm
Post
Add to Collection
Mark as Completed
Load More