I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]Read More Malware via Email
Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
Indulging in the spotlight effect…Read More My REM Alumni Mailbox Shows Its 1337n3ss
Last year I predicted six trends for cybersecurity in 2014. Botclouds not botnets – the idea that malware command and control infrastructure would start to become more cloud based. Cryptocurrency surprise – the idea that things like Litecoin and Dogecoin would be mined by more malware instead of Bitcoin due to the difficulty in mining […]Read More How Did I Do On Last Year’s #Cybersecurity #Trends Predictions?
It’s 2015, and once again I’m going to take a look at what I think will be the trends in cybersecurity for 2015. I’m going to focus on all of them all at once this time, instead of an individual post devoted to each, since it took me so long to do that in 2014. […]Read More #Cybersecurity #Trends for #2015
Image from cxotoday.com. Cross-posted to the Blue Coat security blog. Apologies for the delay in getting this last post in the series out, but I recently got married! We’ve looked at five precious trends for this year and what they’ll mean in the Cybersecurity landscape: botclouds not botnets: the idea that physical machines are becoming […]Read More Cybersecurity Trends for 2014 – Trend 6 – Big Data Becomes Huge Data with Things like SSL Visibility
Picture from androidandme.com. Cross-posted to the Blue Coat security blog. There will always be malware for popular platforms – taking advantage of the most popular platforms brings benefits to those who seek to gain at the expense of others. We’ve seen this in the past – the popularity of Microsoft’s Windows platform (as compared to […]Read More Cybersecurity Trends for 2014 – Trend 3 – Wearable Malware
Litecoin, Dogecoin, and Bitcoin (here slashed for emphasis). Cross-posted to the Blue Coat security blog. There’s a lot of press about Bitcoin, which is an electronic currency that has been around since 2009, but really only in the attention of most people since 2011. Created by “mining”, or solving difficult math problems, each ‘coin’ is […]Read More Cybersecurity Trends for 2014 – Trend 2 – Cryptocurrency Surprise
It’s no longer news that the NSA and GCHQ are using ‘leaky apps’ such as Angry Birds to gain access to people’s data on their mobiles. That I can write that with conviction and that it is considered the ‘new normal’ is disturbing enough in itself. Additionally, there are more and more malware attacks on […]Read More Android Platform Getting More and More Risky @falkvinge @gappsupdates @airbnb @mxdataapps #nsa #gchq #angrybirds #permissions #snowden #gnu #copyleft
Picture from stackbots.com. Cross-posted to the Blue Coat security blog. I’d been attempting to figure out how in the future it will be that botnets will continue to be relevant. It occurred to me that with cloud infrastructure, that malware authors have the perfect opportunity to create or destroy as many machines as they want […]Read More Cybersecurity Trends for 2014 – Trend 1 – Botclouds not Botnets #security #infosec