Cross-posted to “AdventuresInCyberSecurity.com” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people constructing them don’t go through a lot of effort. I received one today that was […]Read More Anatomy of Cryptophishing – Hydro Project
When I first wrote this post, I didn’t know what the final number of Tezos “tezzies” was going to be, and made a guesstimage. The total number has been published: 763,306,929.69 Of course, I was off by quite a bit – more than 200 million of them. However, it’s worth noting that while that’s going […]Read More Re-analysing the #Tezos #ICO & Future #XTZ Price
The ICO raised 65,635 BTC and 361,122 ETH, which at current prices is $226,827,513. They’re of course suffering from the recent “crash” (really just a small drop), but it’ still the biggest initial coin offering ever, by more than $75 million. (They were well over $230 million at one point.) I’ve no idea how many […]Read More Analysing the #Tezos #ICO & Potential #XTZ Future Price
Picture from sigstr.com. It’s that time of year! Time to make predictions for the upcoming year, and as I like to do, I like to try and make them in my field – cybersecurity. These are just my guesses, speaking for myself – I am in no way representing my employer or anyone else. Blockchains […]Read More #Cybersecurity Predictions for 2016
Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
Last year I predicted six trends for cybersecurity in 2014. Botclouds not botnets – the idea that malware command and control infrastructure would start to become more cloud based. Cryptocurrency surprise – the idea that things like Litecoin and Dogecoin would be mined by more malware instead of Bitcoin due to the difficulty in mining […]Read More How Did I Do On Last Year’s #Cybersecurity #Trends Predictions?
It’s 2015, and once again I’m going to take a look at what I think will be the trends in cybersecurity for 2015. I’m going to focus on all of them all at once this time, instead of an individual post devoted to each, since it took me so long to do that in 2014. […]Read More #Cybersecurity #Trends for #2015
Image from hackernews.com. Cross-posted to the Blue Coat Security blog. You know something has become popular when you see it on the Netflix series “House of Cards”. There is an episode in Season 2 where one of the characters gets onto the Deep Web in order to try and trap the protagonist. In the end […]Read More Cybersecurity Trends for 2014 – Trend 4 – The Deep Web Surfaces
Litecoin, Dogecoin, and Bitcoin (here slashed for emphasis). Cross-posted to the Blue Coat security blog. There’s a lot of press about Bitcoin, which is an electronic currency that has been around since 2009, but really only in the attention of most people since 2011. Created by “mining”, or solving difficult math problems, each ‘coin’ is […]Read More Cybersecurity Trends for 2014 – Trend 2 – Cryptocurrency Surprise
Picture from financialcrimeconference.com. With the news that Hong Kong will now be reporting Americans’ incomes to the IRS, it seems that there are few places on earth where one could go to stay away from the prying eyes of the US government. As the only country that taxes its citizens on income earned worldwide, being […]Read More Is Americanism a Virus? Can It Get Blood from a Stone?