Last year I made cybersecurity predictions, broadly rendered as: An increase in SSL visibility. Increased flight of data and sites from the US. Increased necessity for digital forensics in the mobile platform space. TOR would face more scrutiny and have to harden itself against those. Bitcoin would increase its dominance while Ethereum would become more […]Read More How Did I Do On 2015’s #Cybersecurity Predictions?
Last year I predicted six trends for cybersecurity in 2014. Botclouds not botnets – the idea that malware command and control infrastructure would start to become more cloud based. Cryptocurrency surprise – the idea that things like Litecoin and Dogecoin would be mined by more malware instead of Bitcoin due to the difficulty in mining […]Read More How Did I Do On Last Year’s #Cybersecurity #Trends Predictions?
It’s 2015, and once again I’m going to take a look at what I think will be the trends in cybersecurity for 2015. I’m going to focus on all of them all at once this time, instead of an individual post devoted to each, since it took me so long to do that in 2014. […]Read More #Cybersecurity #Trends for #2015
Image from cxotoday.com. Cross-posted to the Blue Coat security blog. Apologies for the delay in getting this last post in the series out, but I recently got married! We’ve looked at five precious trends for this year and what they’ll mean in the Cybersecurity landscape: botclouds not botnets: the idea that physical machines are becoming […]Read More Cybersecurity Trends for 2014 – Trend 6 – Big Data Becomes Huge Data with Things like SSL Visibility
Image from ctvnews.ca. Cross-posted to the Blue Coat security blog. In the previous post, I discussed how the Deep Web was starting to surface. One of the things that shows that this will occur was the Target breach. The malware found in the Point-of-Sale (PoS) systems in the Target breach was using Tor to transmit […]Read More Cybersecurity Trends for 2014 – Trend 5 – 3rd Party Security Requirements Increase
Image from hackernews.com. Cross-posted to the Blue Coat Security blog. You know something has become popular when you see it on the Netflix series “House of Cards”. There is an episode in Season 2 where one of the characters gets onto the Deep Web in order to try and trap the protagonist. In the end […]Read More Cybersecurity Trends for 2014 – Trend 4 – The Deep Web Surfaces
Image from bitcoinboard.net. Bitcoins require ASICs to mine these days, so outside of heading over to butterflylabs.com or kncminer.com and plunking down a fair bit of cash, how does one easily get Bitcoins? The answer is by mining Litecoins and converting them to Bitcoins. Mining Litecoins requires much less power in terms of hardware (for […]Read More #DeepWeb Lesson Number Five: How to Convert #Litecoins to #Bitcoins Easily #agorism
Picture from Northeastern.edu. I gave a talk at the Info Crime Summit in London yesterday, and identified what I think will be six trends in cybersecurity. I won’t provide the details here – I plan to outline those on my company’s blog – but I will provide a link to those posts on twitter. (You […]Read More Trends in #CyberSecurity for 2014 #bitcoin #litecoin #botcloud #deepweb #malware #bigdata
What is a cryptocurrency? Why should you care? Let’s start by looking at the word in parts. The second part, currency, means a medium of exchange. (It’s important to note that we’re not talking about money here, but currency. Only two things are money – gold and silver. Everything else is currency.) The first part, […]Read More #DeepWeb Lesson Number Four: Cryptocurrencies #bitcoin #litecoin #agorism #gloriousagoristfuture @coindesk @localbitcoins
Once you’re on the Deep Web, participating in the glorious agorist future (or just doing your own thing), it’s important that you do everything you can to avoid leaving tell-tale pieces of information about yourself all over the web. What good is it to obfuscate your connection and traffic if you then tell everyone who […]Read More #DeepWeb Lesson Number Three: DuckDuckGo @duckduckgo @yegg @duckduckhack #agorism