Magnus Cloud represents a substantial advancement in cybersecurity defenses, providing an application layer attack countermeasure, while working with traditional network layer solutions. We feel it is important to share our expertise as a way to demonstrate our knowledge of the industry. Check out the short preview of our White Papers below and download the full version if you are interested.

Available White Papers

Captchas Dying vs. The Red Queen

Matt Burgess’ October 2017 article in Wired, entitled “Captcha is dying. This is how it’s being reinvented for the AI age” is worth reading.  A high level survey of the history and misadventures of the CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), the broken aspect of each evolution of the…


ATG Vulnerabilities and Risk Management

The “Internet of Things” (IoT) includes a class of devices known as automatic tank gauges (ATGs).  ATGs play a critical role in monitoring and managing storage tanks, either underground or above-ground (USTs and ASTs respectively), which are used to store hazardous materials such as gasoline, diesel, jet fuel, and so on. ATGs continuously test for leaks, for…


IoT – Hackable Thermostats

The “Internet of Things” (IoT to the cognoscenti) has been around for a while, but is gaining prominence now as almost every technology-based product that can be integrated with Internet access is in fact being integrated for Internet access.  The reasons for doing this are not always compelling…but ‘smart home’ tech has been around for decades (remember the X-10 home…


Attrition Models and Asymmetric Cyberwarfare

In 1999 two colonels in the People’s Liberation Army (PLA) published their treatise, “Unrestricted Warfare” which details asymmetric strategies for defeating opponents that have technological or numerical superiority over your own forces. Cyberwarfare is explicitly called out, identifying the internet and computers in general as a new, fifth domain of warfare (in addition to land,…


DDoS for Bitcoins : DD4BC Extortionists

Tracy Kitten’s recent article on DDoS for Bitcoins (DD4BC) shows the evolution of DDoS attacks into a form of criminal extortion. The advice of law enforcement agencies is: “Don’t pay. File a complaint. Contact your ISP.” This is the online version of the classic protection racket, except that instead of Lewie the Leg Breaker visiting…