Bob Lord πŸ” :donor:

Personal account where the owls are not what they seem.
πŸ¦‰πŸ”οΈπŸ”οΈπŸͺ΅β˜•πŸ©πŸ₯§πŸ•΅οΈβ€β™‚οΈπŸ‘
Also:πŸ”πŸ”‘πŸ”’πŸ’»

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-12

The "AP Cybersecurity Course Framework" document contains some hacklore about "The Dangers of Public Wi-Fi". If you have contacts there, can you please connect me? πŸ™

apcentral.collegeboard.org/cou

Hacklore Central contact info: hacklore.org/about

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-11

πŸŽ… 🎁 A Stop Hacklore t-shirt makes a perfect Christmas gift for that special someone who stayed off the naughty list by not spreading hacklore! πŸ˜‚ πŸ”

bonfire.com/stop-hacklore/

hacklore.org/

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-11

@Geoffairey We can separate the design and manufacturing of software. A great resource for software development is Google's paper on secure by design software:
research.google/pubs/secure-by

For operator errors within enterprises, it's helpful to separate the proximate causes (just left of BOOM) from the multiple contributing root causes. A good book that explains how other sectors treat human error is Behind Human Error by Woods, et al.

If you have specific studies in mind I'd be happy to take a look! πŸ™

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-11

It’s time again for me to listen to my favorite cybersecurity podcast. Well, it’s technically about automotive safety, but I can’t help seeing the parallels to software safety. I hope you find it enlightening too! πŸ’₯ πŸš—

99percentinvisible.org/episode

Bob Lord πŸ” :donor: boosted:
2025-12-10

Thrilled to announce that my talk with @boblord has been accepted to #RSAC! We’re speaking on β€œLess Blood, More Bits: Learning From β€˜Near Misses’ In Cybersecurity.”

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@Geoffairey What sorts of people problems are you thinking of?

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@buherator What are the best anti-scam resources I can link to? It's not the focus on Hacklore but I can make sure there is a smoother on ramp to good guidance.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@cigitalgem @jack_daniel Links to old posts/publications welcome!

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@nuintari Is that real??

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@n_dimension I highly recommend you read Geekonomics by David Rice, and especially Behind Human Error by Woods, et al. The combination of those two books will provide you a ton of additional background and nuance around systems thinking. πŸ™

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@jack_daniel Right. We've put the burden of staying safe on the customer, prevented them from suing for design and manufacturing defects, etc. The best book I've found on this topic is Geekonomics by David Rice. The second best is Unsafe at Any Speed by Nader.

None of this is an accident. The system is designed this way.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@nuintari Which is one of the reasons so many security products are riddled with unforgivable vulnerabilities.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

@buherator I made the edits to the references to "URLs". Thank you for that insight that got past all the proofreaders!!!!!
As for the other part about being able to determine the risk level for a site, well, that might be more of a challenge than copy editing. ;-) But fully agree.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09
Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-09

Does your cybersecurity awareness training contain any hacklore?

I’m collecting examples of hacklore in the wild. Whether it’s training slides, quiz questions, or instructions that focus on rare threats instead of the ones causing the most real-world harm, I want to see it all.

Post some screenshots or notes here, or email them to "info" at hacklore.org. Let’s help organizations replace stale guidance with advice that truly keeps people safe.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-07

@pejacoby @mathew So sentimental. I wish I kept it, as well as my LNW-80. Such lovely memories.

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-07

What if cybersecurity experts wrote PSAs for elevator safety?

πŸ›—πŸ’₯😱

medium.com/@boblord/psa-elevat

Bob Lord πŸ” :donor:boblord@infosec.exchange
2025-12-07

@luis_in_brief @joshbressers The car analogy is one of the better ones I've found in part because the development of safety norms after 1965 closely parallels the software marketplace today. The first few minutes of this video explains a small part of the reason:
youtube.com/watch?v=_n7QRuR_Tck

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst