Black Hat Asia 2020 — From Thoughts to Destiny: Setting the Course of Our Cybersecurity Future
Black Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform...
Black Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform...
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...
While the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved...
In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...
One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...
Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...
Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...
At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...
Are the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one...
Considering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...
One of the interesting topics in the process of building the global or semi-global cybersecurity structures is to consider the process or...
For quite some time China has been blocking access to Facebook from Chinese networks, but recently there have been rumours that the ban...
While preparing for the Internet Governance Forum in Istanbul this year, next week, one cannot avoid reading various discussions and even...
Have you ever wondered what were the interests of the people who Googled you? Have you ever wondered what results did raise their...
I once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will...
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...