Beginning of the End for Anonymous Crypto-Currency?

One of the major attractions of Bitcoin, Etherium, Monero and other crypto-currencies has been the ability to keep your transactions anonymous, away from the prying eyes of governments, law enforcement agencies, and anyone else.  A recent ruling in a federal district court in California will change that.

The court ordered popular crypto-currency exchange and wallet service Coinbase to turn over records on more than 14,000 customers to the IRS.  This came after a year long legal fight which removed the majority ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Is Donald Trump Putin’s Revenge?

A two-part Frontline documentary on PBS titled Putin’s Revenge examines the rise to power of an obscure ex-KGB agent named Vladimir Putin and the tactics he used to influence the last U.S. Presidential Election.  Evidence would indicate that Putin prefers Republics to Democrats.  Worth a look.  Live stream them here.


Continue Reading →
0

An End To Robocalls?

Good news from The Federal Communications Commission (FCC).  Telephone service providers will be legally able to block automated phone calls, commonly known as robocalls.  The new rules enable telephone service providers to block robocalls before they get to our phones. This includes calls from phone numbers on a Do-Not-Originate (DNO) list and those numbers that show up in Caller ID that are “invalid, unallocated, ...

Continue Reading →
0

Why We Want Network Neutrality Back

I like to keep the nasty business of politics off of this website, but every now and again it rears its ugly head in ways we cannot ignore.  Net neutrality is one of those issues.

Politically, I am a fiscal conservative and a social liberal, and voted Libertarian in the last election.  I did not vote for Trump, and I couldn’t vote for Hilary, either.  As predicted, Trump is dismantling a lot of the Obama administration’s legacy, and network neutrality is ...

Continue Reading →
0

Huge Worldwide WordPress Brute Force Attack

The rare Tuesday post, but this couldn’t wait.  If you are running a WordPress site, you need to know this.  This was just released by WordFence.

“Early this morning our team was woken up by systems alerts letting us know that we needed to scale up our attack logging capacity. The number of WordPress attacks we were monitoring per hour ...

Continue Reading →
0

Hidden Web Cams in Airbnb Rentals and Hotel Rooms?

If you are traveling for the holidays, here is something else to watch for – the hidden web camera.  If you are staying at an Airbnb, or even a traditional hotel or motel over the holidays, be aware that there have been incidents where web cams have been found in the rooms.  Often they are disguised as other devices, such as the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Google AI teaches itself ‘superhuman’ chess skills in four hours

Google’s “superhuman” AlphaZero artificial intelligence (AI) taught itself chess from scratch in four hours. Then, it wiped the floor with the former world-leading chess software, Stockfish 8.  Out of 100 matches, AlphaZero won 28 games and drew (tied) the remaining 72.


So long AOL ...

Continue Reading →
0

Would You Give This Guy Your House Keys?

This guy is Jeff Bezos, the CEO of the gargantuan super-retailer Amazon.com. Would you give him the keys to your house?  No?  Well now you can!  Amazon recently launched their new Amazon Key service, a smartphone app controlled door lock.  As an Amazon Prime member myself, I have received several emails about this new product.  My first thought was “what could possibly ...

Continue Reading →
1

Fileless Malware Poses New Threat

There is a new threat appearing on corporate and personal networks called “fileless malware.”  It can sneak by traditional signature recognition endpoint security programs.  It is able to hide and stay resident by using trusted operating system and software application files to run the exploit.

Fileless malware exploits are estimated to comprise almost 30% of new exploits, and that percentage is rising as cyber-crime group move to this newer technology.  Fileless malware exploits are being target at financial institutions and other ...

Continue Reading →
0

DOD and NSA Internet Surveillance Archives Not Secured

Many companies and organization are moving their data repositories to the cloud, to places such as Amazon Web Services (AWS).  Hopefully, if your company is moving to the cloud, you are doing a better job securing this information than the Department of Defense or the National Security Agency.

The first story involves a trove of data left on AWS servers, and discovered by ...

Continue Reading →
0
Page 28 of 61 «...10202627282930...»