Cuckoo Malware Analysis by Digit Oktavianto and Iqbal Muhardianto: A Review

/
I had the opportunity to review and conduct some interesting hands-on examples from Packt Publishing’s “Cuckoo Malware Analysis” by Digit Oktavianto and Iqbal Muhardianto. This book was divided into five intuitive chapters consisting of:

A Book Review of Mobile Security: How to Secure, Privatize, and Recover Your Device

/
The “Mobile Security: How to Secure, Privatize, and Recover Your Devices” by Tim Speed, Joseph Anderson, Darla Nykamp, Jaya Nampalli and Mari Heiser, published by Packt Publishing contains an abundance of information pertaining to the threats mobile devices are susceptible to as well as providing guidelines on how protect them from the assorted threats.

Win A Free Copy of Packt’s ‘Mobile Security: how to Secure, Privatize, and Recover Your Device’ !

/
SecurityOrb.com is pleased to announce that we are organizing a giveaway especially for you. All you need to do is just comment below the post and win a free copy of ‘Mobile Security: how to Secure, Privatize, and Recover Your Device’. Three lucky winners stand a chance to win copy of the book. Keep reading to find out how you can be one of the Lucky One.

Blackhat USA 2013 Summary – Part 3 of 3

/
Blackhat USA 2013 Summary - Part 3of 3

Blackhat USA 2013 Summary – Part 2 of 3

/
Blackhat USA 2013 Summary - Part 2 of 3

Blackhat USA 2013 Summary – Part 1 of 3

/
Blackhat USA 2013 Summary - Part 1 of 3

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 3/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 2/3

/
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security. Its aim, in plain terms, is to improve the usability of security features in end user applications.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 1/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.