The Bank Of England Is Planning A Bitcoin-Style Virtual Currency – But Could It Really Replace Cash?

Governments are extremely worried about cryptocurrencies such as bitcoin. These virtual currencies mean you can make payments without involving the banks that most economies and government financial models are built on. People can transfer large amounts of money without the authorities knowing, potentially making it easier to evade tax or launder money. So several countries’ central… Please follow and like us:

Read More

Is there such a thing as online privacy? 7 essential reads

By The Conversation. Who’s sharing your secrets? Antonio Guillem/Shutterstock Over the course of 2017, people in the U.S. and around the world became increasingly concerned about how their digital data are transmitted, stored and analyzed. As news broke that every Yahoo email account had been compromised, as well as the financial information of nearly every adult… Please follow and like us:

Read More

Is Tor Browser Safe, Signal App Private? Snowden Says FBI Should Use Them

In the wake of reports that text messages between two FBI officials revealed negative opinions of then-candidate Donald Trump, former National Security Agency contractor and whistleblower Edward Snowden offered a piece of advice for those trying to keep communications private: “Use Tor. Use Signal.” The recommendation from the former government employee was directed specifically at FBI… Please follow and like us:

Read More

Don’t Download This Word File: New Ransomware Deletes Victim’s Files In 96 Hours

Security researchers have discovered a new form of ransomware being distributed through malicious Microsoft Office documents and Word files—and attackers have published videos to walk victims through the process of buying Bitcoin to get pay the ransom. The Spider Virus ransomware campaign was first identified on Dec. 10 by researchers at cybersecurity firm Netskope and has… Please follow and like us:

Read More

Dark Web ‘Treasure Trove’ Could Spark Crime Epidemic

A database of 1.4 billion user passwords has been discovered on the dark web, paving the way for what security experts expect to be a “cyber crime epidemic.” The data—compiled from 252 data breaches from websites including LinkedIn, MySpace, Netflix and YouPorn—allows easy access to potentially the largest ever list of information about users. Dark web… Please follow and like us:

Read More

Real security requires strong encryption – even if investigators get blocked

By Susan Landau, Professor of Computer Science, Law and Diplomacy and Cybersecurity, Tufts University. What’s the best way to keep data secure? Victor Moussa/Shutterstock.com The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years. Since the bureau’s dispute with Apple in 2016 over access… Please follow and like us:

Read More

What Is Bad Rabbit? Massive Cyberattack Hits Russia

An advanced cyberattack has hit media outlets and infrastructure in Russia, Ukraine and Eastern Europe, causing mass disruption Cybersecurity researchers from Kaspersky described the malware, dubbed Bad Rabbit, in a blogpost on Tuesday, October 24. They explained how the previously unknown malware takes control of computer systems and encrypts data so that people can’t access it.… Please follow and like us:

Read More

FBI Failed To Access 7,000 Mobile Devices Because Of Encryption

Christopher Wray, the director of the United States Federal Bureau of Investigation (FBI), reported the agency has attempted and failed to extract data from nearly 7,000 mobile devices thanks to encryption, the BBC reported. The FBI attempted to crack to those 7,000 or so devices during an 11-month period. Over that span of time, the agency… Please follow and like us:

Read More

Cryptocurrencies – the Emerged Elephant in the Room

The world’s monetary landscape is shifting, and one of the biggest factors is the dramatic rise in the value of cryptocurrencies so far in 2017. Emerging from the online cypherpunk community, and developed in the late 2000s, cryptocurrencies are digitised coins with no physical format- essentially, it’s currency that exists exclusively in the online world, through… Please follow and like us:

Read More

An Introduction to ‘The Satoshi Revolution’

“You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.” – R. Buckminster Fuller The revolution of 2009 went unnoticed by most people because it was peaceful, orderly and profoundly technological. In 2009, Satoshi Nakamoto released open source software by which peer-to-peer transfers of… Please follow and like us:

Read More

Yahoo says all 3 billion user accounts were exposed in hack: Here’s how to protect yourself!

Another day, another data breach announcement! Yahoo revealed Tuesday that the massive security breach back in 2013 impacted every single user in its database — all three billion accounts — which is triple the number the company originally estimated back in December of last year. After continuing to increase the number of potentially vulnerable users, Yahoo’s… Please follow and like us:

Read More

How to keep other people off your Wi-Fi network

Give digital trespassers the boot. Make sure only welcome guests have access to your Wi-Fi. Stux/Pixabay You don’t want neighbors or passers-by stealing your Wi-Fi any more than you want them stealing your water, electricity, or carefully curated collection of Blu-ray movies. In fact it’s more serious than that—if someone can hook on to the same… Please follow and like us:

Read More

Petya Ransomware Attack May Not Have Been Ransomware After All

The Petya ransomware attack that hit tens of thousands of computer systems in 65 countries earlier this week may not have been ransomware at all, but a more destructive form of malware designed to sabotage government and commercial organizations. A top Ukrainian police official told Reuters on Thursday that there is growing belief the attack was… Please follow and like us:

Read More

Blockchain technology to see growth in next 10 years

Zhang Jian, CEO of BoChen Technology, speaks at a blockchain forum in Guiyang, Guizhou province, May 27, 2017. [Photo provided to chinadaily.com.cn] Blockchain-based application scenarios will become prosperous in the next five to 10 years as the technology continues to improve, Zhang Jian, CEO of BoChen Technology, said. BoChen Technology focuses on the infrastructure creation of… Please follow and like us:

Read More

5 things we learned from WanaCryptor, the biggest ransomware attack in internet history

How do we stop this from happening again? WannaCry Screenshot Screenshot of the ransomware that struck computers across Europe last week. WannaCry, via Wikimedia Commons On Friday, some hospitals in the United Kingdom were struck with a peculiar attack: computers taken over, data inside encrypted and held ransom, all for the measly payment of just $300.… Please follow and like us:

Read More