Tipping Points – Anonymous – Fear Them
Even though the Internet has had many wild and wooly days, I think we reached an interesting tipping point this past year with traditional power structures having power stripped forceabily frome their...
View ArticleReview of past cyber carnage courtesy of .CN
Imagine that all our organizations information was being read by a foreign nation state, who uses it to modernize their arsenals which you might have to fight one day, steal your innovative ideas and...
View ArticleDoD Common Access Card / PIV Pwnage
Typically from a cyberdefense standpoint 2 – factor authentication is the way to go. Well Mandiant just outed??/reported in its awesome M-Trends 2011 report that our adversaries have effectively...
View ArticleUnder-appreciated Concept of Malware Intelligence.
One of the things that drives my research in relation to other technical research on malware that only tends to focus on the bits and the bytes is the fact that you can tell entire stories and...
View ArticleGameChanger: Data Segregation / Timed Data Vaults
Its about time we turned the table on attackers by doing what we should have done long ago. Making the data UNAVAILABLE to them. I came up with this approach a while back doing response. If hostile...
View ArticleInz the Defenses of the Invasion…
falun:法轮They call that there thang’ a Firewahl…. sex:性 tianwang:天王 cdjp av bignews boxun chinaliberal:中国自由 chinamz chinesenewsnet:中国新闻网 cnd creaders dafa:大法 dajiyuan:大纪元 dfdz dpp falu falun:法轮...
View ArticleOn the outside, peering into the incomprehensible.
Malware has reached the point of overwhelming the collective average intelligence of the normal operator. With a plethora of threats, and an infinate amount of possibilities and variations the...
View ArticleNo more echo chambers.
Well it seems like I have acquired something of a following, however it still seems like not many are interested in adding significant discussion or views to lend to the debate. I invite any and all...
View ArticleOperation Starlight: The Chinese PLA Assault on RSA and the undermining of...
An exploration into the potential power of collaborative, mission-focused APT research groups This post will be one of several that will reveal the origins of the investigation, research, and analysis...
View Article
More Pages to Explore .....