Quantcast
Channel: Veiled Shadows » Security
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Tipping Points – Anonymous – Fear Them

Even though the Internet has had many wild and wooly days, I think we reached an interesting tipping point this past year with traditional power structures having power stripped forceabily frome their...

View Article



Image may be NSFW.
Clik here to view.

Review of past cyber carnage courtesy of .CN

Imagine that all our organizations information was being read by a foreign nation state, who uses it to modernize their arsenals which you might have to fight one day, steal your innovative ideas and...

View Article

Image may be NSFW.
Clik here to view.

DoD Common Access Card / PIV Pwnage

Typically from a cyberdefense standpoint 2 – factor authentication is the way to go.  Well Mandiant just outed??/reported  in its awesome M-Trends 2011 report that our adversaries have effectively...

View Article

Image may be NSFW.
Clik here to view.

Under-appreciated Concept of Malware Intelligence.

One of the things that drives my research in relation to other technical research on malware that only tends to focus on the bits and the bytes is the fact that you can tell entire stories and...

View Article

Image may be NSFW.
Clik here to view.

GameChanger: Data Segregation / Timed Data Vaults

Its about time we turned the table on attackers by doing what we should have done long ago.  Making the data UNAVAILABLE to them.  I came up with this approach a while back doing response. If hostile...

View Article


Image may be NSFW.
Clik here to view.

Inz the Defenses of the Invasion…

falun:法轮They call that there thang’ a Firewahl…. sex:性 tianwang:天王 cdjp av bignews boxun chinaliberal:中国自由 chinamz chinesenewsnet:中国新闻网 cnd creaders dafa:大法 dajiyuan:大纪元 dfdz dpp falu falun:法轮...

View Article

Image may be NSFW.
Clik here to view.

On the outside, peering into the incomprehensible.

Malware has reached the point of overwhelming the collective average intelligence of the normal operator.  With a plethora of threats, and an infinate amount of possibilities and variations the...

View Article

Image may be NSFW.
Clik here to view.

No more echo chambers.

Well it seems like I have acquired something of a following, however it still seems like not many are interested in adding significant discussion or views to lend to the debate.  I invite any and all...

View Article


Image may be NSFW.
Clik here to view.

OpStarlight

View Article


Image may be NSFW.
Clik here to view.

Operation Starlight: The Chinese PLA Assault on RSA and the undermining of...

An exploration into the potential power of collaborative, mission-focused APT research groups This post will be one of several that will reveal the origins of the investigation, research, and analysis...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images