Verifying JS Integrity

Yesterday, a CDN was hacked and malicious JS was served to a number of domains. Most websites make use of CDNs to serve up JS so as to reduce page load time. How do we protect ourselves from such attacks? I posed a similar question on Sec.SE some time back. Subresource Integrity is a new ...

Negative space

Sometimes, the lack of information is valuable information. The Washington Post reports that according to unnamed current and former US officials, the CIA pulled "a number of officers" from the US Embassy in Beijing as a precautionary measure following the breach — precisely because their names ...

First Cyberinsurance claim?

I first came across the term cyberinsurance earlier this year while attending an information session in DC. At that point, it was suggested that there needs to be a benchmark that takes into account the cyber risks that companies are facing, for it to be feasible for insurance companies to ...

2Gbps fibre is a gimmick

Singapore is the 2nd fastest country in the world in terms of fibre broadband speeds. However in my opinion, beyond a certain sweet spot of around 300mbps, any additional bandwidth brings about negligible benefit. 1) The server is the bottleneck. Let me use an analogy, you can widen the road in ...

Rules of Engagement in Cyberspace

Rules of engagement is a concept familiar to most military personnels worldwide. The basic premise of having rules of engagement is to ensure an appropriate level of response or reaction to a particular threat. It is sometimes also known as escalation of force. Rules of engagement for physical ...

Facebook Open Graph Tags Modification

A couple of weeks ago, I discovered that Facebook allowed you to change the title and description of links that you post. This allows you to craft some pretty interesting posts. For example: (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = ...

Open letter to ICANN on PPSAI

Subject: I may not need Domain Privacy, but others do! From: Benjamin Lim Date: Fri, 3 Jul 2015 18:12:52 +0200 Dear ICANN, I will not attempt to speak on behalf of the oppressed or the discriminated. There are already enough voices out there advocating the importance of ...

Email fraud part 2

While still on the topic of email fraud, I would like to touch on 419 scams, which are also known as Nigerian scams. Most of us routinely encounter such emails in our spam box, so it shouldn't be too alien to us. The modus operandi for such a scam is as follows. The scam artist first crafts an ...