Quantcast
Channel: Digital Dao
Browsing all 219 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Suits and Spooks from the US, EU, Russia, The Hague to talk 0-day Regulation...

Suits and Spooks London is happening on Friday Sep 12th with speakers from BAE Systems, EUROPOL, CERT-EU, Kaspersky Lab, CrySyS Lab, Goldman Sachs, PwC and other organizations. If you're looking for a...

View Article


Airbus Defense and Space's First APT Threat Intelligence Report: Nice Work!

I've been a frequent and vocal critic of many threat intelligence reports issued by the usual players in information security. So it was very refreshing to read this report by Cassidian CyberSecurity...

View Article


Image may be NSFW.
Clik here to view.

Su Bin, Lode-Tech, And Privatizing Cyber Espionage In The PRC

The criminal complaint against Chinese businessman Su Bin (aka Stephen Su, Stephen Subin) is a must-read. Be sure to read the Wall Street Journal article as well. It marks the first time that the FBI...

View Article

Image may be NSFW.
Clik here to view.

Israel's Power Grid Is Susceptible To A Cyber Attack. Why Hasn't It Happened?

The fighting between Israel and Hamas during Operation Protective Edge has been severe by any measure; especially as regards to the cost of human lives - over 1,800 Palestinians have been killed in the...

View Article

First Look at Suits and Spooks DC 2015: 3 Hot Workshops and over 20 talks and...

Early bird registration is now open for Suits and Spooks DC. We've expanded it to three days so as to include one optional day of training (Wednesday Feb 4). Since this is Suits and Spooks and not your...

View Article


Image may be NSFW.
Clik here to view.

"Hunting For Seeds That Remain Uncultivated, For Ideas That Lie Dormant"

From time to time I like to share gems of insight that I've discovered in the works of others in hopes that someone else will benefit besides myself. I'm always the first one awake in our house...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Marketing and Political Expediency: STOP THE MADNESS

FireEye's APT28 report is the latest in a series of glossy marketing white papers which claim to reveal the workings of "state-sponsored actors", in this case from Russia. The paper fails to prove its...

View Article

Image may be NSFW.
Clik here to view.

"Frank Martin" of the U.S. Government Grants Department Wants To Give Me $14,566

I just ended a ridiculous but entertaining call with "Frank Martin" of the "U.S. Government Grant Department" who wanted to give me $14,566 for being a good taxpayer. I stayed on the line with him for...

View Article


Image may be NSFW.
Clik here to view.

Musashi's "The Way of Self Reliance" (Wilson translation)

Japanese swordsmanship has been a hobby of mine for almost 35 years, and the most famous of all Japanese swordsman is Miyamoto Musashi, author of The Book of Five Rings.One week before his death, he...

View Article


Who Developed China's Laser Weapon and Other Things That Go Boom?

China has spent the last few days showcasing its latest military technology including this new laser weapon that can shoot down drones a mile away in 5 seconds after locating the target. However, if...

View Article

SEC Risk Factors: How To Determine The Business Value Of Your Data To A...

“Consistent with the Regulation S-K Item 503(c) requirements for risk factor disclosures generally, cybersecurity risk disclosure provided must adequately describe the nature of the material risks and...

View Article

Selective Listening Can Kill Your Business (Thank You Gordon Ramsay)

The problem of selective listening (hearing only what you want to hear while ignoring all else) has killed a lot of businesses, especially restaurants. In fact, I suspect that the problem is pervasive...

View Article

The Latest Sony Breach And Its Potential SEC Problems

Sony's (NYSE: SNE) latest network breach is also potentially one of its worst when it comes to financial impact on the company. The attackers (Guardians of Peace) stole five movies including Brad...

View Article


Image may be NSFW.
Clik here to view.

The One Statement That Changes Everything For A Corporation That's Been Breached

Imagine that you're a publicly-owned company that has just been hacked in a BIG way. You're now in damage control mode. You've made a preliminary announcement. You've hired a high profile and very...

View Article

Image may be NSFW.
Clik here to view.

"Measure Twice. Bite Once" - Suits and Spooks DC 2015 Supports The Warrior...

You have 5 days left before the Early Bird rate for Suits and Spooks DC/Pentagon City ends on December 10th. For the first time, we'll be holding this event at the Ritz Carlton Pentagon City and we're...

View Article


Why You Should Demand Proof Before Believing The U.S. Government On North...

Yesterday evening the New York Times reported that un-named American intelligence officials have concluded that the North Korean government was "centrally involved" in the massive breach against Sony...

View Article

Image may be NSFW.
Clik here to view.

Sony, the DPRK, and the Thailand - Pyongyang Connection

UPDATE (19DEC2014 1725PST)I'm top-posting this update because I've just learned of some new information about Loxley Pacific which makes me believe that the Loxley-DPRK connection should be...

View Article


Transcript of Kim Jong-Un's Discussions With His General About Sony

The following is a transcription which I'm certain has been captured by some agency somewhere and provided to me by an un-named, possibly government source. It takes place over several weeks and...

View Article

Image may be NSFW.
Clik here to view.

Linguistic Analysis Proves Sony's Hackers Most Likely Russian, Not Korean

Taia Global's Chief Science Advisor Dr. Shlomo Argamon, one of the country's preeminent researchers in authorship analysis and stylometry, led a team that conducted native language identification (NLI)...

View Article

Image may be NSFW.
Clik here to view.

The Stakes Are High In The Sony Attack Attribution Gamble

“The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment. Attribution to North Korea is based on...

View Article
Browsing all 219 articles
Browse latest View live