Cross-posted to “AdventuresInCyberSecurity.com” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people constructing them don’t go through a lot of effort. I received one today that was […]Read More Anatomy of Cryptophishing – Hydro Project
Regarding this article from a post on Linked In: https://www.bizjournals.com/phoenix/news/2017/07/25/is-cybersecurity-the-y2k-of-this-generation.html Is #cybersecurity the #Y2K of this generation? This author seems to think so. This is telling: “Yes, that [hacking automated trucks] is possible, but the designers of these systems are aware of the issue and are putting measures in place to avoid it.” This completely […]Read More On Hacking Automated Trucks #cybersecurity #y2k #iot
I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]Read More Malware via Email
Picture taken from the linked article. In the Independent, there is this article which talks about Boris Johnson being as trustworthy as David Cameron. Aside from the obvious joke about trusting politicians, there’s an interesting gallery entitled “What has the EU ever done for us?” and which lists seven things, as follows: It gives you […]Read More What has the #EU ever done for Us? #leaveEU #Brexit @independent
Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
This is the logo I’m using for the website, adventuresincybersecurity.com. It occurred to me yesterday that I didn’t actually update this blog with the information that I am now officially a published author! My first book is autobiographical, and available at Amazon. (They’ve got an exclusive for at least the first 90 days.) You can […]Read More I Published a Book! Get “Adventures in Cybersecurity” at Amazon
Last year I predicted six trends for cybersecurity in 2014. Botclouds not botnets – the idea that malware command and control infrastructure would start to become more cloud based. Cryptocurrency surprise – the idea that things like Litecoin and Dogecoin would be mined by more malware instead of Bitcoin due to the difficulty in mining […]Read More How Did I Do On Last Year’s #Cybersecurity #Trends Predictions?
It’s 2015, and once again I’m going to take a look at what I think will be the trends in cybersecurity for 2015. I’m going to focus on all of them all at once this time, instead of an individual post devoted to each, since it took me so long to do that in 2014. […]Read More #Cybersecurity #Trends for #2015
Image from cxotoday.com. Cross-posted to the Blue Coat security blog. Apologies for the delay in getting this last post in the series out, but I recently got married! We’ve looked at five precious trends for this year and what they’ll mean in the Cybersecurity landscape: botclouds not botnets: the idea that physical machines are becoming […]Read More Cybersecurity Trends for 2014 – Trend 6 – Big Data Becomes Huge Data with Things like SSL Visibility
Image from ctvnews.ca. Cross-posted to the Blue Coat security blog. In the previous post, I discussed how the Deep Web was starting to surface. One of the things that shows that this will occur was the Target breach. The malware found in the Point-of-Sale (PoS) systems in the Target breach was using Tor to transmit […]Read More Cybersecurity Trends for 2014 – Trend 5 – 3rd Party Security Requirements Increase