Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Rage against the social media machine: How did it get to this?

Anger against the Bay Area’s iconic social media firms has reached a “boiling point,” experts say.


Why Prime Numbers Still Surprise and Mystify Mathematicians

2300 years later, new patterns continue to show up in these indivisible tricksters.  Primes are used extensively in encryption and blockchain.  Did you know that, except for the first two primes, 2 and 5,  all primes end in 1, 3, 7, or 9?  This article is full of interesting insights into prime numbers.


Beyond the Pipeline: Fighting for Women and Girls of Color in STEM

Degrees Alone cannot squelch assumptions and unconscious biases.  Filling the STEM pipeline with women and people of color requires more advocates and organizations dedicated to addressing equity and systematic issues.


Hacker mines up to $1 million in Verge after exploiting major bug

Earlier this week, investors in the popular privacy-oriented Verge (XVG) cryptocurrency received disquieting news.  According to a forum post, a malicious miner appeared to have found a way to subject Verge to a widely-hypothesized blockchain takeover called a “51% attack”.  In layman’s terms, someone was exploiting the majority of the mining power of the blockchain, potentially gaining power over its currency generation.


Apple Releases Multiple Security Updates

04/24/2018 04:30 PM EDT  Original release date: April 24, 2018

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.  NCCIC encourages users and administrators to review Apple security pages for the following products and apply the necessary updates:


 

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.
  Related Posts

Add a Comment