Why I don’t think Huawei will install back doors in 5G telco equipment — it would be a forced error when they are poised to achieve a win that will give them a strategic advantage for years and maybe decades to come. I don’t think they want to backdoor everything. That’s a sort of crude […]
On Pre Op Hackers
Proper Planning and Preparation Prevents Piss Poor Penetrations I was asked for good references on pre-operation phases of hacking. I recommended Matt Monte’s “network attacks and exploitation: a framework”, and Bill McRaven’s “Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice”. The Monte book is the best book on cyber written so far. […]
Cyber Events
There is a constant need to label cyber operations as “cyber ${battle from history}.” The most recent one, indeed the one that inspired me to write about this phenomenon, is the spectacularly insane “cyber Cuban missile crisis.” The exact quote is from some fraudulent “cyber security experts” apparently: Experts are telling me that the solar […]
- 1
- 2
- 3
- …
- 11
- Next Page »