How do we identify our attackers in cyberspace?
Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender’s perspective, explaining the difficulty of attribution, written by our...
View ArticleThe horror of cyberspace: we can’t easily identify our attackers.
Summary: In this last of Marcus Ranum’s 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible — no matter how confidently they’re stated....
View Article“Countdown To Zero Day” describes the new era of war, preparing you for the...
Summary: Five years after Stuxnet first appeared we have a detailed analysis of its origin (at least, what’s known to the public) in Kim Zetter’s Countdown To Zero Day. Here C. Thomas reviews it,...
View Article
More Pages to Explore .....