Emil TanOct 1, 20202 minBlack Hat Asia 2020 — From Thoughts to Destiny: Setting the Course of Our Cybersecurity FutureBlack Hat Asia 2020 comes to an end yesterday — although most of the content will still be available on the virtual conference platform f...
Div0 Blog EditorAug 17, 20173 minMalicious Attribution & Fallacy of Methodological Nationalism"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would o...
Div0 Blog EditorMay 7, 20175 minShields Up! Wild West of the CyberspaceThe early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various host...
Div0 Blog EditorMar 5, 20176 minResponsible Disclosure — The 4 PathsTim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he stumb...
Div0 Blog EditorFeb 18, 20175 minEver Famous DDoS AttacksReally simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software vulner...
Div0 Blog EditorJul 15, 20164 minImposing & Enforcing Global MandatesWhile the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved questio...
Div0 Blog EditorMay 20, 20163 minFrom Russia With LoveIn the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody seeme...
Div0 Blog EditorFeb 4, 20163 minUK Investigatory Bill EmergingOne of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will ...
Div0 Blog EditorFeb 4, 20163 minMyth & Revival of National Security — Anyone?Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...
Div0 Blog EditorDec 13, 20155 minDangerous Coffee ShopPublic spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when ...
Div0 Blog EditorNov 18, 20154 minConstructing a New Silk RoadAt the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new ...
Div0 Blog EditorSep 4, 20153 minThe Olympic Games for Cybersecurity — Feeding Up the National Pride & ConfrontationAre the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one c...
Div0 Blog EditorSep 3, 20152 minChauvinistic Cyber-Nationalism & Contemporary World PoliticsConsidering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...
Div0 Blog EditorJun 12, 20152 minCapability Development & DemonstrationOne of the interesting topics in the process of building the global or semi-global cybersecurity structures is to consider the process or...
Div0 Blog EditorSep 17, 201411 minSocial Media as Battleground in World PoliticsFor quite some time China has been blocking access to Facebook from Chinese networks, but recently there have been rumours that the ban w...
Div0 Blog EditorAug 23, 20143 minCasting of Internet Governance at the ForumWhile preparing for the Internet Governance Forum in Istanbul this year, next week, one cannot avoid reading various discussions and even...
Div0 Blog EditorAug 13, 20141 minPractical Exploit of Google Ranking AlgorithmsHave you ever wondered what were the interests of the people who Googled you? Have you ever wondered what results did raise their attenti...
Div0 Blog EditorAug 6, 20141 minCreative Password Policy ExperienceI once tried to use passwords which were immune to exhibitionism — i.e. even when someone happens to see them on the screen, he/she will ...
Div0 Blog EditorMay 30, 20143 minEnd-User Awareness Approach to Network SecurityLong gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened ...
Div0 Blog EditorMay 29, 20143 minOptimistic View of Surveillance in the Light of Changing Governance StructuresThis writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent sp...