

Cybercrime in Action - Blackmail
Hi - I am a hacker who broke your email password... This turned up in my email (Google actually classified it as spam), and I suspect...


Outsourcing from a CyberSecurity Perspective - The Unassessed Threat.
Threat vectors. When we list them, where on the list do third-party trust relationships fall? Do we even consider the idea that contract...


Economic Catalysts in Malware Development
This was actually written in October of 2010, in response to getting a continuous stream of the same questions after cleaning malware off...


Someone asked me 'Why'
Someone asked the question, "Why are you on LinkedIn?" (and the SecurityPanda is indeed on LinkedIn). This is what came to mind. That's a...


Shouting into the Void: A Small Rant on Recruiters
These are two articles that I posted on LinkedIn over time, concatenated here as one post. Being on the receiving end of clumsy...


"Hacking" Is Not A Dirty Word - A Brief Treatise on the Origins of IT Creativity
This is something I authored back in 2010, but it is even more pertinent today. It does need updating, and I may very well do that here...


Multi-talented Linux! (Oldie but still worthwhile)
This is a paper I wrote several years back to introduce clients to the flexibility and friendliness of Linux as a desktop operating...


Bridging the Air Gap - Exploring the USBee Attack
Q [aka Quartermaster] must have come up with this … It really does sound like something from a James Bond scenario – A standard USB...


Cyber Threat Intelligence - Where do you get yours?
Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has...


NTP Vulnerabilities: What happens when your best friend turns on you?
Ah, the heartbreak! That ever-reliable best friend quietly running on port 123 and keeping us all in sync. We know it, use and love it…...