Friday, May 30, 2014

What I am reading 5/30/2014 - Thank Jenny McCarthy Everyone

The Verge - Measles hits 20 year high in US, 'driven by unvaccinated people' -

The US Centers for Disease Control and Prevention pins the striking rise in measles cases on unvaccinated people, who make up at least 69 percent of the reported cases. (In 20 percent of cases, the person's vaccination status was unknown. In only 10 percent of cases was the person actually known to be vaccinated.) Some of the unvaccinated people were too young to receive vaccination or said that they had missed opportunities to be vaccinated. But the vast majority, 85 percent, had refrained from vaccination because of religious, philosophical, or personal objections.

I've never heard abject idiocy referred to as a religious, philosophical or personal objection before, but there ya go.

Books -

The Hacker Playbook -

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.




No comments: