Rumors spreading across Indian villages via WhatsApp have fueled more than 12 mob lynchings in recent months. Most recently, a mob killed 5 beggars after a rumor suggested they were trafficking …
Why Can’t Europe Create Tech Giants Like the U.S. and China?
In a region with a comparable economy to the U.S. and with some of the best pools of mathematicians, computer scientists, and software developers in the world, one might expect a European tech giant …
Continue Reading about Why Can’t Europe Create Tech Giants Like the U.S. and China?
Iranian APT poses As Israeli cyber-security firm in spearphishing attempt
An Iranian cyber-espionage group posed as one of the cyber-security firms that identified its previous hacking efforts in a failed spearphishing attempt. The group copied the Israeli companies …
Continue Reading about Iranian APT poses As Israeli cyber-security firm in spearphishing attempt
Binance, world’s largest crypto exchance, resumes services after ‘irregular’ SYS trading risk alert
Binance resumed services on July 4th, a day after suspending all trades and withdrawals due to “irregular” trading of the Syscoin (SYS) currency. SYS announced that they were investigating a “possible …
Embracing a Future of Technical and Political Churn
Two things happened last week that will ultimately have a huge impact on almost every American consumer alive today but unfortunately, you’ve probably never even heard of them. Does the …
Continue Reading about Embracing a Future of Technical and Political Churn
Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses
Hackers have developed a malware (CryptoCurrency Clipboard Hijackers) that monitors the Windows clipboard for copied cryptocurrency addresses. When these addresses are pasted in order to send funds, …
Continue Reading about Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses
Researchers developing shape-transforming drones
Researchers from the University of Tokyo have developed a floating aircraft known as the DRAGON that can fly in a straight, snake-shaped configuration through small spaces, but also transform into …
Continue Reading about Researchers developing shape-transforming drones
DoD still learning how to supply intel for cyber ops
While Cyber has been a recognized warfare domain for almost ten years, the U.S. is still working to improve information sharing relationships between traditional intelligence entities and cyber …
Continue Reading about DoD still learning how to supply intel for cyber ops
US “best in the world” for offensive cyber capabilities, “most vulnerable in world” on defense
The former director for cyber security policy in the Obama White House said that, while the U.S. is the “best in the world on offense,” it is the U.S. the most vulnerable country in the world to cyber …
Researchers publish security flaws in LTE (4G)
A research team published three separate vulnerabilities in the mobile communication standard LTE (4G). Two of the attacks allow an attacker to view LTE traffic and user details, while the third …
Continue Reading about Researchers publish security flaws in LTE (4G)