Is It GAME OVER?

Targeted attacks take many forms, though there is one common tactic most of them share: Exploitation. To achieve their goal, they need to penetrate different systems on-the-go. The way this is done is by exploiting unpatched or unknown vulnerabilities. More common forms of exploitation happen via a malicious document which exploits

Continue Reading

Most cyber attacks start with an exploit – I know how to make them go away

Yet another new Ransomware with a new sophisticated approach http://blog.trendmicro.com/trendlabs-security-intelligence/crypvault-new-crypto-ransomware-encrypts-and-quarantines-files/ Pay attention that the key section in the description on the way it operates is “The malware arrives to affected systems via an email attachment. When users execute the attached malicious JavaScript file, it will download four files from its C&C server:” When users

Continue Reading

Facelift to My Blog

After several years of running my blog on Typepad I moved back to wordpress! The control, modern UI, diversity of plugins and themes and connectivity to the social world made me stop being lazy

Distributed Cyber Warfare

One of the core problems with cyber criminals and attackers is the lack of a clear target. Cyber attacks are digital in nature and as such, they are not tied to a specific geography, organization and or a person – finding the traces to the source is non-deterministic and ambiguous.

Continue Reading

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts are compromised, then your whole system is compromised, and the compromised ones become your weakest links. The weakest link fits

Continue Reading

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand in this match.  Attackers are on the rise due to their growing financial interest—motivating a new level of sophisticated

Continue Reading

My Security Crystal Ball

2014 has ended and 2015 is just warming up. We had a year full with big news on security threats and breaches and I collected some industry predictions for 2015 and added my own abbreviated commentary. At the end you can find my own predictions for security in 2015.  

Continue Reading

What does cross platform mean?

Cross platform is tricky. It seems like a small “technical” buzzword but actually, it is one of the biggest challenges for many technology companies and has different aspects for different people in the organization and outside of it. Developer Point of View It all starts with the fact that applications

Continue Reading

The dark side of Android fragmentation

One of the main problems with Android for app developers contemplating on Android vs. iOs is the fact it is highly fragmented. On  iOS you, unconsciously, know that you need only to build one version (Let’s keep the example simple) and it will work on all devices, you know that

Continue Reading

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports the external interface. Let me elaborate on this: The internal perspective shows the building blocks and layers within the application

Continue Reading

Thoughts on business strategies?

Every now and then I stop and think on how I perceive the concept of strategy in the business environment and how it relates to other terms such as: strategic plans, tactics, objectives, mission, vision and policies. I welcome any kind of feedback and within time I will update this

Continue Reading

Site Footer