Skip to main content
  • Title
    Why Cybersecurity Is a Losing Game

    KEY PLAYERS OF CYBER ATTACKS

    In the recent publication of MIT Technology Review on "Cyber Attacks"[1], among other things cyber criminals, cyber-spies, hacktivists, and state-sponsored actors are key players.

     

    NINE CYBER ATTACK PATTERNS

    Nine classification patterns covered the majority (92%) of 100,000 security incidents of past 10 years, according to Verizon's 2013 study [2].

    The basic patterns are listed below.

    1. Point of Sales Intrusions

    2. Web Application Attacks

  • penetration testing
    The Value of Penetration Testing
    Penetration Testing is a cyber security practice during which some trusted party attempts to detect and exploit weaknesses in the targets' security. The targets can be infrastructure (firewall, router, servers, etc.), applications and data / intellectual property.
  • White hat
    The Story of a White Hat Hacker

    The Person

    Tom is employed as a cybersecurity consultant in town. Some call him an ethical hacker or white hat hacker; he doesn’t care. In his thirties, he's at the golden age of life. Nonetheless, Tom can seldom have one or two quiet dinners with his wife and kid in a month. Work-life balance means not much to him. Often he starts his job at mid-night in a freezing data centre or a deadly quiet office.

     

  • DDos
    Dynamics of DDoS Cyber Attacks and Defenses
    Distributed denial of service (DDoS) is a kind of cyber attack that is getting more advanced and sophisticated. It is relevant to understand this from a holistic way in order to prepare to more relevant defenses.
  • On Certainty Level of Digital Evidence
    Cyber attacks and online criminal activities are growing rapidly. However the level of certainty of digital evidence is not explicitly presented by the investigators. This may lead to misinterpretation and shaky conclusion.