Thursday, March 10, 2011
Optimal Methods for Spam and DDoS Offender Discovery
›
As botnet threats go, Spam and DDoS are probably the most widely known and discussed tactics employed by criminal operators. Despite being...
GeoIP Irrelevance
›
GeoIP has traditionally served as a first pass filter for prioritizing the analysis of inbound threats. Over the last few years the value ...
Nuclear Winter PCAP Repositories
›
Recently I've been thinking about the catchall approach to security - in particular the absolute-last-stop method of just recording ever...
Wednesday, February 23, 2011
Threatology
›
Just a recap on some thinking covering threats and the folks who study them... One of the key principles to understanding the threat is havi...
Reinventing the Sandpit
›
Sometimes it feels that the IT security world loves innovation as much as it loves to reinvent the wheel – particularly when it comes to w...
Post-emptive Detection
›
In the week before RSA I managed to pull together a blog on the Damballa site covering several of the problems with approaches that focus up...
Monday, December 27, 2010
Covert Penetration
›
In what sometimes feels like a past life after a heavy day dealing with botnets, I remember fondly many of the covert and physical penetrati...
Friday, December 10, 2010
Google Maps for Command & Control
›
You've probably heard about the protests going on in London concerning the proposed uptick in University fees and the way in which some ...
‹
›
Home
View web version