Libertarian Party Comes Out In Support of BitCoin

This is reprinted from an email I received from the Libertarian Party on Monday August 24th.

Cryptocurrency has been on an historic run in recent days, reaching heights not seen in years and positioning itself as a hedge against economic uncertainty to rival more traditional safe harbors like gold and silver. As central banks continue printing off ream after ream of fiat currency, the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


U.S. Cyber Command Shares 11 New Malware Samples

Original release date: September 8, 2019

U.S. Cyber Command has released 11 malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA ...

Continue Reading →
0

Is Drug Kingpin Paul Le Roux the Inventor of Bit-Coin?

Paul Calder Le Roux, a brilliant South African software programmer who ran the most successful and largely legal opioid marketing networks called RX Limited, and morphed into running a huge illegal international drugs and arms dealing empire that has ever been seen.  Since his arrest in 2012, he has been spending time in the custody of the DEA, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The US is reportedly seeding Russia’s power grid with malware

The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid.

My comment:  Anybody who wonders why the bad guys are always attacking the US, well, it’s because we are doing it ...

Continue Reading →
0

Docker Vulnerability Allows Crypto-Miner Access

If you are running a fleet of virtual machines using popular containerization solution Docker, you may be in for a nasty surprise.  A couple of vulnerabilities have been discovered in Docker that has been exploited by cyber-criminals to run the Monero crypto-currency miner on affected Docker containers.  This will of course have a serious impact on performance, and in an environment where billing is usage based, this will increase your ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft: Protecting Your Credit and Finances

Check this out from the Simple Dollar.  Tax-related identity theft is a growing problem in America, and the more security breaches, information hacks and digital business we do as a society, the more consumers who fall victim to it. In fact, in 2016 alone, thieves stole more than ...

Continue Reading →
0

Most Common Malware of 2019 (So Far)

In 2015 and 2016 the winner was crypto-ransomware exploits.  In 2017 and 2018 the most common exploit was Business Email Compromise, aka Email Account Hijacking (BEC/EAC).  This is year is shaping up to be the year of the crypto-mining exploit.

Here are the crypto-mining malware programs that are the most prevalent:

  • AuthedMine – A variant of Coinhive, AuthedMine ios supposed to require an explicit opt-in from the end user to run the miner. This is designed to run on browsers with ad-blockers ...
Continue Reading →
0

Hiding from the Biggest Spy on the Internet – Part 4

In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google.  Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online.  These solutions will work well not just against Google, but also against the data ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn-warning security scam hooks you up to “Apple Care”

It’s a toll free “Apple Care” number, meaning that in theory it shouldn’t cost you a thing – so what’s the harm in calling just in case?


Extortionist lawyer pleads guilty to creating porn honeypot

These guys give lawyers a bad name, if that isn’t an ...

Continue Reading →
0
Page 4 of 5 12345