Toggle navigation
SECUR
1
TY
Find an Expert
Toggle Dropdown
Compliance
Incident Response
Penetration Testing
Software Development
Website/Application Security
Security Marketing and PR
Security Staffing
Education and Training
Network Security
Social Engineering
Cryptography
Mobile App Security
Video Surveillance
CIO / CTO / CSO / CISO / Virtual CISO
Private Investigation
Custom
More...
For Experts
Advice
Sign Up
Login
deckerp
follow
×
Welcome! Create a free account.
I want to hire
an expert
Post a description. Connect with top security and IT experts.
Sign up as a business
or
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
1
Followers
1
Following
14
Posts
Posts by deckerp
How to Enable Multifactor Security on Amazon
Multi-factor authentication helps Amazon customers better secure their accounts
TWO-FACTOR AUTHENTICATION
TUTORIAL
AMAZON
PASSWORD
Free tool uses Twitter Direct Messages to control hacked computers
Twittor that uses Direct Messages on Twitter as a command-and-control server for botnets
TWITTER
PAUL AMAR
DIRECT MESSAGE
TWITTOR
COMMAND AND CONTROL
PYTHON
BOTNET
NSA discloses most zero-day flaws it finds, but won't say if it uses them first
Agency reportedly uses some of the bigger flaws to first develop cyber-weapons
CYBER WEAPONS
ZERO DAY EXPLOIT
NSA
ISACA: 74% organizations think they will be hit by an APT in the near future
BYOD is increasing APT risks and large use of mobile devices is increasing the attack surface
WATERING HOLE
ISACA
BYOD
ATTACK SURFACE
APT
SPEAR PHISHING
A Second Snowden Has Leaked a Mother Lode of Drone Docs
groundbreaking documents related to America’s use of unmanned aerial vehicles to kill targets
DRONE
NSA
Federal CISOs Propose New Efforts to Shore Up Cybersecurity
CISOs suggestions to combat future hacks and improve overall security in the private sector
BEST PRACTICES
CISO
DHS
Microsoft Bounty Programs Expansion - Bounty for Defense, Authentication Bonus, and RemoteApp
Description of expansion of Microsoft's Bug Bounty program
BUG BOUNTY
Schneier: Back Doors Won't Solve Comey's Going Dark Problem
Problem is that there exists at least one securely encrypted communications platform ISIL can use
ISIL
JAMES COMEY
SCHNEIER
ENCRYPTION
Mozilla patches critical bugs in fresh Firefox update 39
Latest update to the browser fixes a number of critical and high-risk vulnerabilities
FIREFOX
Ignoring Mobile Security Doesn't Make It Go Away
Mobile devices and apps are rife with vulnerabilities, and the solution is to write more secure code
SWIFTKEY
BLUEBOX
MOBILE APPS
IOS
Using Actionable Intelligence to Prevent Future Attacks
Using details from security incidents to better architect your defense
APT
PALO ALTO NETWORKS
Security Specialists See Cyber Threats Growing
Rise in insider attacks from privileged users with access to sensitive data, consultants and employe
INSIDER THREAT
HUMAN FACTORS
Password Manager LastPass got Breached Hard
It's a reminder to make your master password as long and random as possible
LASTPASS
Hola: A free VPN with a side of botnet
Free Hola package operates by reselling the bandwidth of Hola users resulting in botnet-for-sale
BOTNET
DDOS
VPN
Following
ISIS’s OPSEC Manual Reveals How It Handles Cybersecurity
Serious Security Problem with Amazon; How Is This Even Possible?
Some common sense on data encryption
iPhone apps ISIS militants download to stop counter-terrorism units picking up their conversations
How to Enable Multifactor Security on Amazon
Experience
deckerp has not filled out any achievements
Yours
FREE!
Where should we email
free access to your Security Grader?
We don't share emails
Get
FREE
access to my Security Grader