In this post I talked about the motivations for DDOS. Political acts, extortion, revenge… all typical motivations. That doesn’t really account for the Mirai DDOS. The...
Continue reading...DTRAP Journal
Minding the Air Gap
Once upon a time (I always wanted to start a blog post like that) the air gap considered a primary defense. If your computer wasn’t connected...
Continue reading...Malware and Caves and Dragons, oh my!
In thispost I talked about sampling bias. I’m going to expand more on that subject, because I think it’s interesting and useful. Cavemen is a popular...
Continue reading...A Little More Conversation
Every bit of research begins with an idea. I wonder if… Is it possible that… Could we maybe… These are sentences I’ve started when doing my...
Continue reading...Sampling Bias
The amount of data in Cybersecurity research is sometimes overwhelming. To get around this amount of data, we sample. That means we choose a subset of...
Continue reading...Moving From Research to Practice
Moving research in the area of cybersecurity into practice often is difficult for many reasons. I decided to look at another field which has similar issues,...
Continue reading...The Benefit of Hindsight
Twenty years ago, the Melissa Virus was big news. It was the first mass mailing virus that spread itself from systems that used Word and Outlook...
Continue reading...Double Blind
I’m often asked why DTRAP is using a double blind system for reviews. The answer: We want to limit the amount of bias in the system....
Continue reading...The Principle of Containment
If a human virus researcher decided to test a new virus they’ve created by just releasing it to the world and seeing what happens, then that’s...
Continue reading...Jumping to Conclusions Without a Parachute
This study discusses whether or not it’s more useful to wear a parachute when jumping out of an airplane. It comes to the surprising conclusion that...
Continue reading...