Cyber Squirrel 1 has existed for nearly eight years now. Eight years of cataloging power outages caused by squirrels but also birds, snakes, raccoons, rats, slugs, sharks, jellyfish, etc… The…
Here is a copy of my introductory statement from the May 22, 2018 briefing where L0pht revisited its historic Senate testimony of twenty years earlier. (supporting links at the end.)…
Two of the largest companies in the world are bickering with each other about how best to protect users. I won’t get into just how historically hypocritical this is for…
Or: If a pipeline explodes in the desert and there is no one there to hear it was it really a cyberwar attack? No one questions the importance of keeping…
I almost wasn’t going to write about the supposed cyber attack at the New York Times last week as reported by Fox Business because I just haven’t had the time…
Book Review: This Machine Kills Secrets By: Andy Greenberg Penguin Group 2012 ISBN 978-1-101-59358-5 *Page references have been taken from the electronic iPad version I’ll admit I haven’t finished the…
If publishing unsourced emails claiming to be from Iran is a newsworthy event then I guess we should all copy Mikko and do the same thing. A few years ago…
Cyber Squirrel 1 Dataset Released
Cyber Squirrel 1 has existed for nearly eight years now. Eight years of cataloging power outages caused by squirrels but also birds, snakes, raccoons, rats, slugs, sharks, jellyfish, etc… The…
Book Review: Cult of the Dead Cow
TL, DR: It's a good story, not a history book. If you are looking for a good story with a message, read it. If you are looking for a nuanced…
Revisiting L0pht testimony – 20yrs later
Here is a copy of my introductory statement from the May 22, 2018 briefing where L0pht revisited its historic Senate testimony of twenty years earlier. (supporting links at the end.)…
In the Beginning There was Full Disclosure
Two of the largest companies in the world are bickering with each other about how best to protect users. I won’t get into just how historically hypocritical this is for…
Four Unnamed Sources
Or: If a pipeline explodes in the desert and there is no one there to hear it was it really a cyberwar attack? No one questions the importance of keeping…
Another BIG hack that wasn’t
No time to do a full analysis but the basics are a story out of Israel of a tunnel that was hit by a sophisticated cyber attack that caused a...…
Anatomy of Hype, Take 2
I almost wasn’t going to write about the supposed cyber attack at the New York Times last week as reported by Fox Business because I just haven’t had the time…
Fitness and Discipline for Cyber Warriors
“More PT Drill Sergeant, more PT! We like it, We love it, We want more of it!” There is a basic tenant in most of the worlds military forces that…
Book Review: This Machine Kills Secrets
Book Review: This Machine Kills Secrets By: Andy Greenberg Penguin Group 2012 ISBN 978-1-101-59358-5 *Page references have been taken from the electronic iPad version I’ll admit I haven’t finished the…
Emails From Michael In Iran
If publishing unsourced emails claiming to be from Iran is a newsworthy event then I guess we should all copy Mikko and do the same thing. A few years ago…
Next Page »