top of page
Search
Emil Tan
Oct 2, 20202 min read
Black Hat Asia 2020 — From Thoughts to Destiny: Setting the Course of Our Cybersecurity Future
Black Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform...
301 views0 comments
Div0 Blog Editor
Aug 17, 20173 min read
Malicious Attribution & Fallacy of Methodological Nationalism
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...
25 views0 comments
Div0 Blog Editor
May 8, 20175 min read
Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...
16 views0 comments
Div0 Blog Editor
Mar 5, 20176 min read
Responsible Disclosure — The 4 Paths
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...
37 views0 comments
Div0 Blog Editor
Feb 18, 20175 min read
Ever Famous DDoS Attacks
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...
15 views0 comments
Div0 Blog Editor
Jul 16, 20164 min read
Imposing & Enforcing Global Mandates
While the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved...
10 views0 comments
Div0 Blog Editor
May 21, 20163 min read
From Russia With Love
In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...
14 views0 comments
Div0 Blog Editor
Feb 5, 20163 min read
UK Investigatory Bill Emerging
One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...
9 views0 comments
Div0 Blog Editor
Feb 5, 20163 min read
Myth & Revival of National Security — Anyone?
Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...
10 views0 comments
Div0 Blog Editor
Dec 14, 20155 min read
Dangerous Coffee Shop
Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...
14 views0 comments
Div0 Blog Editor
Nov 19, 20154 min read
Constructing a New Silk Road
At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...
6 views0 comments
Div0 Blog Editor
Sep 5, 20153 min read
The Olympic Games for Cybersecurity — Feeding Up the National Pride & Confrontation
Are the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one...
8 views0 comments
Div0 Blog Editor
Sep 4, 20152 min read
Chauvinistic Cyber-Nationalism & Contemporary World Politics
Considering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...
12 views0 comments
Div0 Blog Editor
Jun 13, 20152 min read
Capability Development & Demonstration
One of the interesting topics in the process of building the global or semi-global cybersecurity structures is to consider the process or...
7 views0 comments
Div0 Blog Editor
Sep 18, 201411 min read
Social Media as Battleground in World Politics
For quite some time China has been blocking access to Facebook from Chinese networks, but recently there have been rumours that the ban...
14 views0 comments
Div0 Blog Editor
Aug 24, 20143 min read
Casting of Internet Governance at the Forum
While preparing for the Internet Governance Forum in Istanbul this year, next week, one cannot avoid reading various discussions and even...
11 views0 comments
Div0 Blog Editor
Aug 14, 20141 min read
Practical Exploit of Google Ranking Algorithms
Have you ever wondered what were the interests of the people who Googled you? Have you ever wondered what results did raise their...
18 views0 comments
Div0 Blog Editor
Aug 7, 20141 min read
Creative Password Policy Experience
I once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will...
13 views0 comments
Div0 Blog Editor
May 31, 20143 min read
End-User Awareness Approach to Network Security
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...
8 views0 comments
Div0 Blog Editor
May 30, 20143 min read
Optimistic View of Surveillance in the Light of Changing Governance Structures
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...
13 views0 comments
BLOG: Blog2
bottom of page