This post introduces principal database vulnerabilities, providing an overview of the possible effects for their exploitation. For each database vulnerability, the principal cyber threats are exposed and a few suggestions are proposed for their mitigation. In the second part of the article interesting statistics related to the incidents/data breaches […]
One-time passwords are used to achieve higher security than traditional static passwords. They’re often generated by tokens. This article presents how tokens (synchronous and asynchronous) can be used to generate one-time passwords. Moreover, it describes a one-time password system that solves the scalability problem with tokens.
2. Identification and […]
This article gives you a short and understandable summary about web servers, the different types of servers, the security add-on software installation process, and security aspects In this article we will learn the installation of a control panel and a benefits of add-on security software.
Web servers, just as a […]
Steganography is the art of hiding information to prevent detection of a hidden message. It has been used throughout history by many methods and variation, ancient Greeks shaved heads of messengers and tattooed the secret message, once the heir grew back the message remained undetectable until the head is […]
I. Criticism and possible flaws of consequence-based approach and seven-factor test
There are people from the field of law, and not only, who do not think that everything with fitting cyber attacks to the law of resort to use of force with the help of consequence-based approach will go smooth […]
Reading about cybercrime, it is very easy to find terms such as attacks-as-a-service, malware-as-a-service and fraud-as-s-Service, that are commonly used to describe the practice of facilitating illegal activities for cybercriminals through the provisioning of services. Security experts working for principal security firms have observed a radical change in the […]
The consequence-based duo tests
The focus of this contribution is placed on two tests which employ the consequence-based approach that, in turn, aims to categorize cyber attacks as a use/threat of force or an armed attack pursuant to UN Charter. Interestingly, such a method within the method reminds me ace […]
While still reviewing the instrument-based theory, there was a slight allusion at some point that oftentimes from practical reasons the gravity of acts occurring in the international medium is divided into various standards—a sign self-evidently speaking in favour of consequences criteria over the instrument one.
A bright example accounting […]
The saga continues. Now things get really interesting. In our last episode our identity thief had successfully procured a check made out to the dealership for a high end (approx. $100K) vehicle he has absolutely no intentions on purchasing. As I stated before, he is only interested in the […]
Who is Edward Snowden?
Edward Snowden is the man who changed the history of the Internet; he revealed information on the largest and most secret surveillance program implemented by the U.S. Government.
Snowden is a 29-year-old technical assistant for the Central Intelligence Agency who has worked at the National Security Agency […]
The International Association of Cloud & Managed Services Providers (MSPAlliance) recently announced guidelines intended to give businesses the tools they need to make smart and informed decisions about how their data interacts with the cloud.
The guidelines are based in part on the Unified Certification Standard for Cloud & Managed […]
Harriet Beecher Stowe is credited with the quote “Human nature is above all things lazy” – while I prefer to think of myself as ‘efficient’ rather than lazy I think the principle is sound. When faced with the choice of executing a task in a difficult or simple […]
1. Criticism and Possible Flaws of Consequence-Based Approach and Seven-Factor Test
There are people from the field of law, and not only from that field, who do not think that fitting cyber attacks to the law of resort to use of force with the help of consequence-based approach will go […]
Cyber security goes to the offensive, governments, intelligence agencies, law enforcement and private companies are evaluating the possibility to adopt an offensive approach to defend their assets from cyber-attacks or to assert its supremacy.
In recent years, the number of cyber-attacks that hit private companies and government entities has rapidly […]
The target-based is the second approach that theorists and practitioners use to tuck cyber warfare into the unfitting law framework that jus ad bellum represents, at least concerning the implementation of such non-kinetic means. Deeming the instrument-based approach to be crippled and ineffective as far as unconventional attacks […]
Note: This is the first in a series of articles written by a convicted felon currently serving 57 months in a federal correctional institution for identity theft and mail fraud.
I am a former identity thief. That’s not a fact of which I’m proud. I sit here at Fort Dix […]
The coming of new technologies is challenging to many fields of human activity. In particular, there is a discrepancy between IT and the laws that regulate armed conflicts. It seems that legal frameworks, such as that stipulated by the UN Charter, are a little bit outdated in the […]
In this article one of the most debated intelligence company is presented: the Palantir Technologies, a firm that is recognized as one of most brilliant providers for data analysis solutions. It is also known for its collaborations with US Intelligence agencies, and according to part of the security community […]
Encryption is a great tool for reducing risks of the loss and interception of data. Encryption technology it has become increasingly deployable and powerful and is commercially available to all. National government security agencies now have cause for concern about its effects upon their collection capabilities. Many countries have […]
How could organisations leverage open-source intelligence to gain more insight into their cyber threats?
It seems that many organisations, including some of the largest ones, do not sufficiently utilize the open-source intelligence capabilities available online in order to gain further insight into their own cyber security threats. By adopting even […]