top of page

N.E.mation! 11 Sharing Session

3 Sep 2016 — Div0 Crew Emil Tan shared insights on cybersecurity in the context of Total Defence to the Top 100 N.E.mation! 11...

CVE-2011-2894

Background According to CVE, Spring Framework has security restrictions as one serialise an object, but does not have any security...

From Russia With Love

In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...

Kippo – A SSH Honeypot (Updated)

Update Note Cowrie – a (relatively) new SSH honeypot – has been my obsession for the week. I took a quick first glimpse at Cowrie, and I...

UK Investigatory Bill Emerging

One of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will...

Dangerous Coffee Shop

Public spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when...

Constructing a New Silk Road

At the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new...

BLOG: Blog2
bottom of page