Proper Planning and Preparation Prevents Piss Poor Penetrations I was asked for good references on pre-operation phases of hacking. I recommended Matt Monte’s “network attacks and exploitation: a framework”, and Bill McRaven’s “Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice”. The Monte book is the best book on cyber written so far. […]
Cyber Events
There is a constant need to label cyber operations as “cyber ${battle from history}.” The most recent one, indeed the one that inspired me to write about this phenomenon, is the spectacularly insane “cyber Cuban missile crisis.” The exact quote is from some fraudulent “cyber security experts” apparently: Experts are telling me that the solar […]
How to hide money laundering on the blockchain
This is a summary of the key points from this article: How to Not Get Caught When You Launder Money on Blockchain? Seems like successfully laundering Bitcoins is fairly complicated, lots of pitfalls. Secrecy is usually binary, it is all or nothing. If there is secrecy for 99 transactions and then a failure on the […]
- 1
- 2
- 3
- 4
- Next Page »