top of page
Search


Black Hat Asia 2020 — From Thoughts to Destiny: Setting the Course of Our Cybersecurity Future
Black Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform...

Emil Tan
Oct 2, 20202 min read
Â
Â


Malicious Attribution & Fallacy of Methodological Nationalism
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...

Div0 Blog Editor
Aug 17, 20173 min read
Â
Â


Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...

Div0 Blog Editor
May 8, 20175 min read
Â
Â


Responsible Disclosure — The 4 Paths
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...

Div0 Blog Editor
Mar 5, 20176 min read
Â
Â


Ever Famous DDoS Attacks
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

Div0 Blog Editor
Feb 18, 20175 min read
Â
Â


Imposing & Enforcing Global Mandates
While the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved...

Div0 Blog Editor
Jul 16, 20164 min read
Â
Â


From Russia With Love
In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...

Div0 Blog Editor
May 21, 20163 min read
Â
Â


UK Investigatory Bill Emerging
One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...

Div0 Blog Editor
Feb 5, 20163 min read
Â
Â


Myth & Revival of National Security — Anyone?
Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...

Div0 Blog Editor
Feb 5, 20163 min read
Â
Â


Dangerous Coffee Shop
Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...

Div0 Blog Editor
Dec 14, 20155 min read
Â
Â


Constructing a New Silk Road
At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...

Div0 Blog Editor
Nov 19, 20154 min read
Â
Â


The Olympic Games for Cybersecurity — Feeding Up the National Pride & Confrontation
Are the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one...

Div0 Blog Editor
Sep 5, 20153 min read
Â
Â


Chauvinistic Cyber-Nationalism & Contemporary World Politics
Considering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...

Div0 Blog Editor
Sep 4, 20152 min read
Â
Â


Capability Development & Demonstration
One of the interesting topics in the process of building the global or semi-global cybersecurity structures is to consider the process or...

Div0 Blog Editor
Jun 13, 20152 min read
Â
Â


Social Media as Battleground in World Politics
For quite some time China has been blocking access to Facebook from Chinese networks, but recently there have been rumours that the ban...

Div0 Blog Editor
Sep 18, 201411 min read
Â
Â


Casting of Internet Governance at the Forum
While preparing for the Internet Governance Forum in Istanbul this year, next week, one cannot avoid reading various discussions and even...

Div0 Blog Editor
Aug 24, 20143 min read
Â
Â


Practical Exploit of Google Ranking Algorithms
Have you ever wondered what were the interests of the people who Googled you? Have you ever wondered what results did raise their...

Div0 Blog Editor
Aug 14, 20141 min read
Â
Â


Creative Password Policy Experience
I once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will...

Div0 Blog Editor
Aug 7, 20141 min read
Â
Â


End-User Awareness Approach to Network Security
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...

Div0 Blog Editor
May 31, 20143 min read
Â
Â


Optimistic View of Surveillance in the Light of Changing Governance Structures
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...

Div0 Blog Editor
May 30, 20143 min read
Â
Â
BLOG: Blog2
bottom of page