top of page
Search


Black Hat Asia 2020 — From Thoughts to Destiny: Setting the Course of Our Cybersecurity Future
Black Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform...

Emil Tan
Oct 2, 20202 min read
305 views
0 comments


Malicious Attribution & Fallacy of Methodological Nationalism
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...

Div0 Blog Editor
Aug 17, 20173 min read
25 views
0 comments


Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...

Div0 Blog Editor
May 8, 20175 min read
17 views
0 comments


Responsible Disclosure — The 4 Paths
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...

Div0 Blog Editor
Mar 5, 20176 min read
41 views
0 comments


Ever Famous DDoS Attacks
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

Div0 Blog Editor
Feb 18, 20175 min read
16 views
0 comments


Imposing & Enforcing Global Mandates
While the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved...

Div0 Blog Editor
Jul 16, 20164 min read
11 views
0 comments


From Russia With Love
In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...

Div0 Blog Editor
May 21, 20163 min read
19 views
0 comments


UK Investigatory Bill Emerging
One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...

Div0 Blog Editor
Feb 5, 20163 min read
10 views
0 comments


Myth & Revival of National Security — Anyone?
Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...

Div0 Blog Editor
Feb 5, 20163 min read
10 views
0 comments


Dangerous Coffee Shop
Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...

Div0 Blog Editor
Dec 14, 20155 min read
14 views
0 comments


Constructing a New Silk Road
At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...

Div0 Blog Editor
Nov 19, 20154 min read
6 views
0 comments


The Olympic Games for Cybersecurity — Feeding Up the National Pride & Confrontation
Are the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one...

Div0 Blog Editor
Sep 5, 20153 min read
9 views
0 comments


Chauvinistic Cyber-Nationalism & Contemporary World Politics
Considering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...

Div0 Blog Editor
Sep 4, 20152 min read
13 views
0 comments


Capability Development & Demonstration
One of the interesting topics in the process of building the global or semi-global cybersecurity structures is to consider the process or...

Div0 Blog Editor
Jun 13, 20152 min read
7 views
0 comments


Social Media as Battleground in World Politics
For quite some time China has been blocking access to Facebook from Chinese networks, but recently there have been rumours that the ban...

Div0 Blog Editor
Sep 18, 201411 min read
15 views
0 comments


Casting of Internet Governance at the Forum
While preparing for the Internet Governance Forum in Istanbul this year, next week, one cannot avoid reading various discussions and even...

Div0 Blog Editor
Aug 24, 20143 min read
12 views
0 comments


Practical Exploit of Google Ranking Algorithms
Have you ever wondered what were the interests of the people who Googled you? Have you ever wondered what results did raise their...

Div0 Blog Editor
Aug 14, 20141 min read
19 views
0 comments


Creative Password Policy Experience
I once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will...

Div0 Blog Editor
Aug 7, 20141 min read
15 views
0 comments


End-User Awareness Approach to Network Security
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...

Div0 Blog Editor
May 31, 20143 min read
9 views
0 comments


Optimistic View of Surveillance in the Light of Changing Governance Structures
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...

Div0 Blog Editor
May 30, 20143 min read
14 views
0 comments
BLOG: Blog2
bottom of page