What We Are Working On
A View From Cyberspace
New Cybersecurity Strategies Needed as Attacks bypass Defenses
In a new chapter to the increasing sophisticated world of cyber technology exploitation, U.S. cybersecurity researchers at FireEye have discovered evidence of a stealthy attack vector on Internet traffic network routers that allows cyber espionage to go undetected. Use of this data extraction and redirection exploit has been observed internationally against network traffic routing devices owned by a variety of private…
Russian Trolling
I don’t think we know what Russia’s cyber capabilities are. The Republic of Georgia and Ukraine had different types of cyber-attacks that crippled parts of their Internet,
Flashback: Mi5 in World War Two
MI5’s fortunes were rapidly restored by a former head of the Delhi Intelligence Bureau and chairman of the Indian Public Service Commission, Sir David Petrie,
Stay Connected





