Daily Archives: September 29, 2015

19 Laws of Information Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 19 Laws of Information Security

How the Internet Blackmarket is Structured

The video above shows the mapping of how the blackmarket works. Research done @Google in collaboration with Berkeley, Databricks, UCSD, UCSB, George Mason University and Michigan State University.

Posted in Security Blog | Tagged , , , , | Comments Off on How the Internet Blackmarket is Structured