Iceland cuts power to new Bitcoin miners

Iceland cuts power to new Bitcoin miners

Starting December 7, no new requests for power from Bitcoin mining operations will be accepted from the country’s energy utility service. National Iceland electrical company Landsvirkjun has cut the amount of power it will provide for some industries, including aluminum smelters and Bitcoin (BTC) miners. A representative from the island’s power utility reported it has…

Can Bitcoin’s hard cap of 21 million be changed?

Can Bitcoin’s hard cap of 21 million be changed?

What is a hard market cap? A hard cap is a parameter that the crypto analytics websites and the project’s community watch closely. A hard cap is a limit set by the code of a blockchain on the absolute maximum supply of a cryptocurrency. A hard cap prevents any further production or circulation of the cryptocurrency’s…

“Mindset Recognition” … à la Stefan Schnoor

“Mindset Recognition” … à la Stefan Schnoor

… saw this on Stefan Schnoor’s LinkedIn profile. He is on my “check in with” list.   Quote: About Die meisten Unternehmen argumentieren viel zu viel und vernachlässigen den wichtigsten Verkaufsfaktor: die Emotion. Kunden wollen nicht überredet, sondern verführt werden. Daher ist Emotion viel wichtiger als alle Sachinformationen und Produktbeschreibungen. Die Telekom verkauft Datentarife. Harley-Davidson…

NSA TAO Chief on Disrupting Nation State Hackers

NSA TAO Chief on Disrupting Nation State Hackers

Rob Joyce, Chief, Tailored Access Operations, National Security Agency From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce talks about the security practices and capabilities that most effectively frustrate people seeking to exploit networks. Rob Joyce began serving as the Chief of the National Security…

MacOS Being Picked Apart by $49 XLoader Data Stealer

MacOS Being Picked Apart by $49 XLoader Data Stealer

Cheap, easy and prolific, the new version of the old FormBook form-stealer and keylogger has added Mac users to its hit list, and it’s selling like hotcakes. There’s a new version of the old FormBook form-stealer and keylogger that’s added Mac users to its hit list, and it’s selling like hotcakes on underground markets for…

Evolving Cognitive Warfare

Evolving Cognitive Warfare

The nature of ongoing warfare has evolved, resulting in new wars that sometimes go unnoticed. Disinformation campaigns have become real weapons of mass disruption, weakening the proper functioning of our democratic societies. They spread and circulate quickly, are inexpensive and have a high impact. For Professor Giordano, the human brain has thus become the battlefield…

China’s Cognitive Warfare

China’s Cognitive Warfare

Members of a Chinese military honor guard at the Ministry of Defense, Beijing, 2007. CREDIT: Staff Sgt. D. Myles Cullen (USAF)/Public Domain 11 FEB 2019 DEVIN STEWART: Hi, I’m Devin Stewart here at Carnegie Council in New York City, and today I am speaking with Rachael Burton of the Project 2049 Institute in Arlington, Virginia.…

AI emotion-detection software tested on Uyghurs

AI emotion-detection software tested on Uyghurs

A gate of what is officially known as a “vocational skills education centre” in Xinjiang By BBC’s Jane Wakefield – Technology reporter- 26 MAY 2021 A camera system that uses AI and facial recognition intended to reveal states of emotion has been tested on Uyghurs in Xinjiang, the BBC has been told. A software engineer…

We Infiltrated a Counterfeit Check Ring! Now What?

We Infiltrated a Counterfeit Check Ring! Now What?

A counterfeit check image [redacted] that was intended for a person helping this fraud gang print and mail phony checks tied to a raft of email-based scams. One fraud-fighting group is intercepting hundreds to thousands of these per day. By Brian Krebs – Krebs on Security Imagine waking up each morning knowing the identities of…

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

Federal investigators focused not on offensive hacking efforts or surveilling communications, but on the transactions using cryptocurrency. The Department of Justice said today that it has taken down the massive dark web child-porn site Welcome to Video. The site generated and distributed exploitative content, and had infrastructure in place that could have supported up to…

Dr. James Giordano: The Brain is the Battlefield of the Future (WestPoint)

Dr. James Giordano, Chief of the Neuroethics Studies Program and Scholar-in-Residence in the Pellegrino Center for Clinical Bioethics at Georgetown University, speaks to cadets and faculty about how advancements in neuroscience and neurotechnology will impact the future of war. This event was hosted by the Modern War Institute at West Point.   see: https://idstch.com/threats/future-neuro-cognitive-warfare-shall-target-cognitive-physiological-behavioral-vulnerabilites-adversary/  …

What is Bot Sentinel? Twitter Account Authentication Rating

What is Bot Sentinel? Twitter Account Authentication Rating

Bot Sentinel is a free non-partisan platform developed to classify and track inauthentic accounts and toxic trolls. The platform uses machine learning and artificial intelligence to classify Twitter accounts, and then adds the accounts to a publicly available database that anyone can browse. Accounts are rated based on a scoring system from 0% to 100%,…

Foreign Interference Attribution Tracker: Origin & Dispersion

Foreign Interference Attribution Tracker: Origin & Dispersion

The DFRLab’s Foreign Interference Attribution Tracker (FIAT) is an interactive, open-source database that captures allegations of foreign interference relevant to the 2020 election. This tool assesses the credibility, bias, evidence, transparency, and impact of each claim. Explore by scrolling through the timeline and map below. Hover over a circle to see details about a particular…

Morphing computer chip repels hundreds of professional DARPA hackers

Morphing computer chip repels hundreds of professional DARPA hackers

Trying to hack the “unhackable” Morpheus system is described as like trying to solve a Rubik’s Cube that is constantly being rearranged [signature-free security!! — TJACK]   By Michael Irving May 24, 2021 Engineers have designed a computer processor that thwarts hackers by randomly changing its microarchitecture every few milliseconds. Known as Morpheus, the puzzling processor…