Archive for June, 2012

“The early bird gets the worm” or “Can you be faster than FUD?”

June 27, 2012

This is an old saying and like most old sayings it bears some truth: the first one to notice an opportunity does indeed have an advantage. But I don’t want to philosophize about “ancient wisdom” or something the like but I want to address a quite up-to-date topic: 0-day prevention, early warning systems, heuristic detection […]

Tags: , ,
Posted in Conference, Security Intelligence Comments Off on “The early bird gets the worm” or “Can you be faster than FUD?”

A „Cool War“ is not cool

June 18, 2012

The term „Cyberwar“ carries a dark fascination. Most people think of it as „war lite“. You get all the benefits of a real war, but the casualties are limited to bits, bytes and maybe pixels. No one dies, only the targets get destroyed. This sounds too clean to be true. There is even an article […]

Tags: , ,
Posted in Discussion, High Entropy Comments Off on A „Cool War“ is not cool

Software Development and Security Training

June 11, 2012

Prior to every DeepSec conference we offer two-day trainings, and we regularly advertise trainings on secure software development. Attending security-centric workshops is really not meant as a humiliation. Modern (and not so modern) software development deals with a lot of code and dependencies. Even if your code is clean and well-written there’s a chance that […]

Tags: , , ,
Posted in Security, Training Comments Off on Software Development and Security Training

The Internet: Agora or Boudoir?

June 10, 2012

Some people believe the Internet is like the Agora of ancient Greek cities where everybody meets and everything happens in public and open sight while others regard it is as their boudoir where they can pursue their private business without anyone peeping through the keyhole. The challenge is that the Internet is both and this […]

Tags: ,
Posted in Discussion, Internet Comments Off on The Internet: Agora or Boudoir?

Collateral Damage in Cyberspace

June 8, 2012

„In cyberspace, no one can hear you scream.“ System administrators know this already for a long time, as do security researchers. Everybody is talking about „cyberwar“ these days (elections are coming). No one is talking about the (digital) fallout from „cyberwar“ operations. Unless you solely rely on passive methods, there’s not much that can happen. […]

Tags: , , ,
Posted in High Entropy, Security 1 Comment »