As I referenced in the Linkedin post below, spying should be assumed until proven otherwise for all Chinese-sourced digital products. China has a well-documented history of spying for the purpose of stealing intellectual property as well as gathering real-time intelligence, for both commercial and military purposes, and the groups behind both activities are often the … Continue reading China - Espionage or Sabotage?
No wonder we keep getting breached…
Dark Reading’s 2021 Strategic Security Survey was highly informative, not only in what it did include but also in what it did not. In particular, when asking 150 technical and cybersecurity professionals to rate the effectiveness of cybersecurity practices, there are 3 practices in particular that leaped out at me as missing from the survey results … Continue reading No wonder we keep getting breached…
Looking for dohservers.txt?
As soon as the idiocy known as DNS over HTTPS (DoH) first appeared, I was one of the first to warn how this was a fundamentally bad idea. It breaks the widely used DNS-based controls that individuals, families, and businesses have deployed in recent years to restrict access to malicious and unwanted (porn, social media, … Continue reading Looking for dohservers.txt?
Hong Kong is China
If you are using country geo-blocks on your firewall as I recommend, it is important to remember that Hong Kong is now indistinguishable from China when it comes to data privacy. With the return of Hong Kong to China’s control and the addition of the National Security Law to Hong Kong’s Basic Law, this means … Continue reading Hong Kong is China
Another Router Bites the Dust
Another day, another long-term, critical, and likely unpatchable flaw in consumer and business routers is exposed. See https://www.cpomagazine.com/cyber-security/12-year-old-router-vulnerability-discovered-affecting-millions-of-devices-exposing-serious-supply-chain-risks/ As I have said repeatedly, the software in most consumer routers is crap, and this is being generous. Not only is it crap to begin with, even when critical flaws are discovered and exposed it can take … Continue reading Another Router Bites the Dust