Recently I have been researching the cyber threats in the maritime industry, what has been done and which areas are not well investigated. I have summarised the initial recon in this field in a mind map – not very accurate
Sorry, this entry is only available in Български.
For a long time I’ve retained myself from commenting on the HBGary case. And that’s because everyone already spoke out – louder and not that louder – their own opinions. So I thought that everything on that theme is already
Purely technical The attacker count on weaknesses in protocol implementation, application, OS, firmware etc.. Those attacks can be easily automated and if the vulnerability is well known pretty easy to defend of. On the other hand the attack can come