top of page

Ever Famous DDoS Attacks

Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

From Russia With Love

In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...

UK Investigatory Bill Emerging

One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...

Dangerous Coffee Shop

Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...

Constructing a New Silk Road

At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...

Creative Password Policy Experience

I once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will...

BLOG: Blog2
bottom of page