Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

The Anatomy of Social Engineering 2: Evolutionary Triggers

The key subject matter here is how exploiting evolutionary aspects naturally affects humans in terms of manipulative influence and social engineering proper. Ties to Evolution So, let’s talk about social engineering and exploiting the human’s mind, because there’re vulnerabilities in a human mind that...

The Anatomy of Social Engineering

Reflected herein is a study by the Florida State University researchers pertaining to the analysis of social engineering from a psychological perspective. We’re going to talk about social engineering, and perhaps how you can use it to have more fun next week, if you’re not stuck doing work all the time. ...

The Modern History of Cyber Warfare 9: Cybersecurity Hurdles

The lecture wraps up with an overview of the principal policy hurdles for the West in terms of implementing proper cybersecurity now and in the future. Now I will go over, basically, the policy hurdles that the West faces (see right-hand image), specifically this country, the United States. This portion of...

The Modern History of Cyber Warfare 8: A History of Legislature Failure

This part encompasses a retrospective review of US laws and acts as well as pros and cons of current legislative proposals on the surveillance of cyberspace. So, let’s talk about US legislature in this area, or what I subtitled as “a history of failure” (see right-hand image). In the 1980s...

The Modern History of Cyber Warfare 7: Legislation and Policies

Coverage of the existing legislation addressing cybercrime, as well as cooperation of private sector and government in this realm, are reflected in this entry. So, how do we begin making policies and laws with all this uncertainty? It’s really a problem that I’m glad I don’t have to fix. However,...

The Modern History of Cyber Warfare 6: Possible Cyber War Scenario

What gets overviewed herein is the modeling of a cyber war if it were to break out, and the various nuances of attacker attribution in the present-day world. So here’s what the common perception of what a cyber war would look like. There will be, basically, targeted efforts and pervasive cultural efforts...

The Modern History of Cyber Warfare 5: The Internet of Things

The lecturer now outlines the hazards associated with billions of things being connected to the Internet and highlights nation state cyber warfare goals. As we’re approaching billions and billions of things connected to the Internet, imagine supply chain attacks for what we are calling the Internet of...

The Modern History of Cyber Warfare 4: 0day Black Market and State Sponsored Attacks

This entry covers the issue of 0day exploits being discovered and unethically used by some companies to gain profit, and touches upon state sponsored attacks. We are basically kind of in the middle of a cyber cold war, and the evidence is kind of staring right at us. So let’s talk about, basically, the...

The Modern History of Cyber Warfare 3: Ongoing Debate on APTs

This section touches upon the tangible consequences of advanced persistent threats being utilized and the debate concerning the acceptable extent of that. While we’re talking about groups of hackers, let’s just dive into the deep end of it: advanced persistent threats, and talk about the small history...

The Modern History of Cyber Warfare 2: Hacker Culture in the Western and Eastern World

The “Offensive Security” lecture at FSU continues with extensive analysis of advanced persistent threats of the last several years and an overview of hacker culture differences globally. So, while we were still in 2010, in June Stuxnet was discovered; at least Stuxnet v.1.01.1, and everyone in...