Security

Security

17 Posts
The Future of Cyber Warfare

The Future of Cyber Warfare

Reading time 12 mins, or listen: 1. The Future of Cyber Warfare Introduction Since we connected everything to the internet, we’ve entered the fourth …

Viasat Ukraine Case Study

Viasat Ukraine Case Study

Introduction Ukraine is in the news for all the wrong reasons. Over the last decade, it has suffered a barrage of cyber-attacks attributed to Russia, including …

Cloudflare Workers

Converted https://socialrecommendator.com to a statically hosted, serverless cloud function invoking, single page app, from the single page php it was for 10 …

John Stewart talking Lemming Theory in security practices #aisa

Getting “Londoned” – losing your email account

This is the collation of last week’s interesting APWG mailthread on getting “Londoned”, when your GMail/Facebook/… account is compromised and all your …

Social paraSites

We already had online virusses and worms, now we got paraSites too. The word ‘parasite’ comes from the Greek ‘parasitos’ (but then in …

Get hacked, get charged, get offline

This is a fictitious story about a small Australian business owner, let’s say a Dentist. One day she decides to spend her marketing dollars on a website, …

A saphe Xmas

The Xmas season is upon us, as evident by the Xmas trees appearing in shopping malls, and the Xmas promotions filling up our (e-)mailboxes. One such Xmas promo …

Australian Internet Censorship

My take on the “Clean Feed” filter, aka the “Rudd Filter”. But first this. A 2006 UQ study found that road accidents, more than 25,000 serious injury accidents …