Russian APT28 botnet FBI

Russia: Skilled Political Warfare Adversary

Russia, neatly tucked away in the rather large northeast corner of Europe and Asia with its 11 time zones, is the bastion of a most colorful political history. Since time immemorial there has always been underlying efforts to adjust perception, foment discord and inflame animus among targeted groups both foreign ... Read More
social engineering, attacks, media Media cybersecurity

Hezbollah Amplifies Message Through Savvy Use of Media

Hezbollah, the “Party of Allah” (aka Party of God) recognized as a Shi’a Islamist political party and militant group based in Lebanon, has repeatedly demonstrated its mastery of the use of media and social networks to shape public opinion and grow sympathetic followers. Even recently the group has placed its ... Read More
Kaspersky Says Its Hand Was in the Cookie Jar, But ...

Kaspersky Says Its Hand Was in the Cookie Jar, But …

Kaspersky Lab has been bombarded with an unending stream of claims that its Russian roots equate to being part of the Russian national team when it comes to national security interests. We previously discussed the rationale behind the ban of Kaspersky Lab security products in any U.S. government device, and ... Read More
Proposed Active Cyber-Defense Bill Channels Mao Zedong

Proposed Active Cyber-Defense Bill Channels Mao Zedong

When an intruder is discovered in your network, every incident response team’s response is similar: What are they doing? What have they done? How long have they been here? Whose data has been compromised? How do we expunge them from our network? And the million-dollar question: Who are these miscreants ... Read More
Skype End-to-End Encryption

DOJ, AG Tout ‘Responsible Encryption’ to Bolster Prosecutions

In the past week, U.S. Deputy Attorney General Rod J. Rosenstein delivered two talks that implored the technology industry to embrace what he deems “responsible encryption.” When he spoke at the United States Naval Academy, he cloaked his commentary in hyperbole and innuendo, as if he was trying to draw ... Read More
FireTail digital identity decentralized Entitle API identity credential theft

The Russian Bull’s-Eye on NSA

Last week the Wall Street Journal broke a story about yet another, as yet unidentified, National Security Agency (NSA) contractor who has been taken into custody for improper handling of classified materials. This individual loaded ultra-sensitive NSA documents on to his devices, which apparently used Kaspersky security software. Allegedly, the ... Read More
Dissecting China's Global Bilateral Cybersecurity Strategy

Dissecting China’s Global Bilateral Cybersecurity Strategy

Is China making nice in the cyberworld or is the company blowing smoke up our legs? Over the course of the past two years, we have seen China sign multiple bilateral cybersecurity agreements with countries that all could classify as potential adversaries and pursue high-level dialogue when agreements are a ... Read More
threat-informed defense

Privacy and Surveillance Self-Defense

When reading the latest iteration of the Electronic Freedom Foundation’s “Surveillance Self-Defense” (SSD) guide on maintaining one’s privacy, one might write it off as another stellar entry for those who enjoy “buzzword bingo.” To do so would be a mistake; while the guide is chock-a-block full of buzzwords, it is ... Read More
cybersecurity malware

Cryptocurrency, We Embrace You. No, We Eschew You

Do you have a bit of cryptocurrency in your pocket? With the rise of a Bitcoin to the value of US$4,374 (as of Oct. 2) many who don’t have a Bitcoin or two are envious of those who do. And while there are a great many uses for Bitcoin and ... Read More
Waymo, Uber Smokin' Due Diligence Report is on Fire

Waymo, Uber Smokin’ Due Diligence Report is on Fire

The Waymo v. Uber court battle continues to captivate us, as the federal court made public the August 2016 due diligence report which Uber’s outside counsels had contracted Stroz Friedberg to conduct prior to the purchase of the self-driving startup Ottomotto. The 34-page document appears to pour gasoline on the ... Read More