Limor Elbaz

Peerlyst's "Beginner's Guide to Information Security" is free on August 16!

Peerlyst’s first e-book, The Beginner’s Guide to Information Security, is now a week old. To celebrate, we’re offering the Guide for free on August 16. Head over here to get your free copy from Amazon: http://www.amazon.com/dp/B01JTDDSAM. And once you do, please support the Peerlyst community’s first foray into book publishing by writing a review. To whet your appetite… Read more
5
1
Write a comment...
Violet Blue
Facebook's plan to circumvent ad-blocking makes malvertising easy

Facebook's plan to circumvent ad-blocking makes malvertising easy

Malware, ransomware, fraud, and 0-day attack vectors will now be a part of the Facebook experience. Facebook said on Tuesday that it will soon change the experience for users of its desktop site by forcing ads on people who use ad-blockers, circumventing ad-blockers altogether. CNET wrote, The social-networking giant unveiled on Tuesday a plan likely to boost its sales and make its adverti… Read more
12
1
4
Write a comment...
J.L. Balbiano
As I never click links, it doesn't affect me directly. But not everyone is as maniac as I am, risky move.

Ed Yuwono

Ed Yuwono
Facebook released this yesterday, it states that the links are scanned. However I'm not too sure to what level, the net effect when using URL shorteners, etc: https://www.facebook.com/notes/protect-the-graph/protecting-privacy-and-security-and-delivering-better-ads/1755896854650458
1
1
Peerlyst
Bug Bounties Spike as Software Firms, Researchers Compete for Flaws

Bug Bounties Spike as Software Firms, Researchers Compete for Flaws

Apple offers $200,000 for serious software security flaws. Then an independent broker offers a cool $500,000. Is this a sign of a short-lived bubble or will the value of exploits continue to climb? At the Black Hat 2016 security conference in early August, Apple offered select researchers up to $200,000, to find previously unknown ways to compromise the company's iOS operating system or iCloud service.

Write a comment...
Limor Elbaz

eBook learnings and next eBook planning

Hi everyone, As you all know by now, we recently launched our first eBook this week and it's already the #1 result for "security for beginners" and # result on Amazon for "security". You've all done a great job authoring and reviewing. If you have not already, please do give our amazing contributors a "thanks you" in the form of a raving review here:&… Read more
4
2
4
Write a comment...

Joe Gray

Joe Gray
I would be happy to both distribute the book to students at both institutions that I teach at as well as contribute to the next book. Limor Elbaz‍ make it happen....and you should appear on my podcast to promote the current book and announce the call for speakers.
2
Darrell Drystek
A fellow ISACA Board member told me that he was quite impressed with our book and the good range of topics covered. He teaches a couple of information security courses at the University of Winnipeg. He said he plans to recommend our book to his students.
2
1
Andrew Douma
Buying a professional penetration testing laptop for 2017

Buying a professional penetration testing laptop for 2017

Free stock photo, credit Picjumbo.com Pentesting laptop I need to place my bet on a new pentesting laptop that will get me further into the 21st century. This article discusses some of my considerations when faced with this decision. All prices listed are from early August 2016. Brand choice Amongst my peers, there are four favorite brands: Apple, Dell, HP and IBM/Lenovo. I also reviewed al… Read more
8
3
7
Write a comment...
Davide Fini
I'm using a Lenovo T460s from a couple of months and I'm more than satisfied! I'm running several VMs and using KALI as pen test OS with very impressive results. Apart problems with Lenovo security holes, their products are used to be very affordable for a huge amount of time.
7
1

Paul Stewart

Paul Stewart
I use a ASUS laptop with Core i5 CPU, 12 Gb RAM and Samsung 850 Pro Evo SSD. Runs windows 10 and Kali VM without problems. You're only as fast as your slowest component, however, you can chase specs all day but it'll do the bank balance no good. For me the purchase of a machine comes down to build quality. I've used laptops from all the top manufacturers. I've watched most of … Read more
3
1
Peerlyst
How to Torrent Safely and Legally

How to Torrent Safely and Legally

Torrenting is usually associated with copyright infringement. Online pirates use torrents to illegally download movies, video games, music, software, and much more. Even before Netflix banned the use of VPNs to watch movies and TV shows, many resorted to torrents to pirate video.

Write a comment...