Cross-posted to “AdventuresInCyberSecurity.com” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people constructing them don’t go through a lot of effort. I received one today that was […]Read More Anatomy of Cryptophishing – Hydro Project
Regarding this article from a post on Linked In: https://www.bizjournals.com/phoenix/news/2017/07/25/is-cybersecurity-the-y2k-of-this-generation.html Is #cybersecurity the #Y2K of this generation? This author seems to think so. This is telling: “Yes, that [hacking automated trucks] is possible, but the designers of these systems are aware of the issue and are putting measures in place to avoid it.” This completely […]Read More On Hacking Automated Trucks #cybersecurity #y2k #iot
Gary Markstein, as above. Edit: Original post still below, but I’ve been informed by several of the Threat Researchers with whom I work that this report is not supposed to be considered as the government’s proof, merely things that organisations can use in order to protect themselves. With that understood, it still furthers a narrative […]Read More U.S. Government Releases “Proof” of U.S. Election Hacking by Russians
I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]Read More Malware via Email
Picture taken from the linked article. In the Independent, there is this article which talks about Boris Johnson being as trustworthy as David Cameron. Aside from the obvious joke about trusting politicians, there’s an interesting gallery entitled “What has the EU ever done for us?” and which lists seven things, as follows: It gives you […]Read More What has the #EU ever done for Us? #leaveEU #Brexit @independent
Picture from sigstr.com. It’s that time of year! Time to make predictions for the upcoming year, and as I like to do, I like to try and make them in my field – cybersecurity. These are just my guesses, speaking for myself – I am in no way representing my employer or anyone else. Blockchains […]Read More #Cybersecurity Predictions for 2016
Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
It’s been a while since I posted anything, as anyone who reads this blog (though I doubt there are many) must realize. My son turns seven months old today, and of course that has something to do with it, but at the same time it’s also been a bit of laziness. Hopefully that will change […]Read More Getting Back to Blogging
This is the logo I’m using for the website, adventuresincybersecurity.com. It occurred to me yesterday that I didn’t actually update this blog with the information that I am now officially a published author! My first book is autobiographical, and available at Amazon. (They’ve got an exclusive for at least the first 90 days.) You can […]Read More I Published a Book! Get “Adventures in Cybersecurity” at Amazon
Last year I predicted six trends for cybersecurity in 2014. Botclouds not botnets – the idea that malware command and control infrastructure would start to become more cloud based. Cryptocurrency surprise – the idea that things like Litecoin and Dogecoin would be mined by more malware instead of Bitcoin due to the difficulty in mining […]Read More How Did I Do On Last Year’s #Cybersecurity #Trends Predictions?