Attacks tend to find the common denominator. What is the most common shared resource between the most devices under attack. For a long time this has been… Read more “Why is mobile different from previous computing systems?”
Tag: security
WHO ARE THE BAD GUYS?
A basic taxonomy of cyber-actors By David Perry In the beginning, there were hackers. They sat alone, playing online games, hanging out in BBS systems closed to… Read more “WHO ARE THE BAD GUYS?”
I never METADATA I didn’t like.
It’s about time for another Black Hat/DEFCON season, and I am going over my notes from last year. One of the most remarkable things in last year’s… Read more “I never METADATA I didn’t like.”
SCADA System attack: should you be concerned?
Here’s a rare chance to get a peek into the future. There is yet another malware attack on Industrial Control Systems (ICS) and Supervisory Control and Data… Read more “SCADA System attack: should you be concerned?”