Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not. This course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as much technology as possible. One of the most common unknown pieces of technology in...

Scroll to top
Exit mobile version