Stopping Malware’s Main Challenge

Why Malware Hurts A random office colleague opens a very realistic email and inadvertently downloads a small piece of software called a “payloader”.  That payloader then calls home and a remote hacker starts injecting various malware – viruses really...

Network Isolation Has Failed

Flawed RoutingI remember a few years ago when I was talking with some people in charge of building nuclear plants and how they went on and on about how secure their systems were due to network isolation.  I kept attempting to point out that between their new Internet...

The Blockchain POA

Who Do You Trust?I was reading an article today about blockchain in 5G and it got me thinking about how this type of blockchain system would actually work.  We have written in the past about a new type of blockchain system that is optimized for systems at scale such...

Is It All A Scan?

Scanning RealityAs part of my continuous effort to keep on top of cybersecurity, I was watching a CEH video yesterday which overviewed the various ways in which hackers search for vulnerabilities.  It all came down to the same end result – port scanning. I then...