Drones used as Proxies to get around ISP blocking and law enforcement: Predator’s to add server payload?

  • Post author:
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read

Cross Posted from TheAviationist. Nearly in contemporary with the breaking news that a judge in New Zealand’s High Court has…

Continue Reading Drones used as Proxies to get around ISP blocking and law enforcement: Predator’s to add server payload?

Attacks Raining Down from the Clouds

  • Post author:
  • Post last modified:November 22, 2011
  • Post category:CloudSecurity
  • Post comments:0 Comments
  • Reading time:4 mins read

Update November 24: New EU directive to feature cloud 'bridge'. The Binding Safe Processor Rules (BSPR) will ask cloud service…

Continue Reading Attacks Raining Down from the Clouds

Consumerization Of Warfare 2.0

  • Post author:
  • Post last modified:June 21, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:4 mins read

It looks like the consumerization of warfare is unstoppable and getting more and more mobile. After our first post of…

Continue Reading Consumerization Of Warfare 2.0