It has been 4 years now since Lockheed Martin released their "Cyber Kill Chain" paper, which describes the stages that the perpetrator of an advanced persistent threat (APT) takes. This kind of attack sequencing is not new, the American military and other government forces have used similar models to show the stages of a terrorist … Continue reading Kill chain models
Month: January 2015
Storing passwords in your browser
Passwords, passwords, passwords. We’ve come to a point where it’s impossible to have a life online without a gazillion passwords, which should all be complicated, long and unique. The easiest way to solve this is by letting the browser store the passwords for you. You make up something random, and let the browser remember it … Continue reading Storing passwords in your browser