More than 1 million T-Mobile customers exposed by breach

More than 1 million T-Mobile customers exposed by breach

T-Mobile has confirmed a data breach affecting more than a million of its customers, whose personal data (but no financial or password data) was exposed to a malicious actor. The company alerted the affected customers but did not provide many details in its official account of the hack. The company said in its disclosure to…

Beyond 3nm: The END of Silicon & The Future of Computing

Beyond 3nm: The END of Silicon & The Future of Computing

We are finally getting to the end of progression in silicon technology. What will replace silicon? This video covers some of the potentials of future computing architecture. Liquid Transistor (Gallium & Iridium) Nanomagenetics (Vortex Domain Wall Structures) Light (Optical) Computing – Surface Plamons Quantum Computing (Superposition Calculations) Alternative Materials to Silicon: Galium Nitride, and Graphene…

ENISA threat landscape for 5G Networks

ENISA threat landscape for 5G Networks

This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset diagram), the assessment of threats affecting 5G (threat taxonomy), the identification of asset exposure (threats – assets…

Study Finds ‘Fake News’ Has Real Cost: $78 Billion

Study Finds ‘Fake News’ Has Real Cost: $78 Billion

Cybersecurity company CHEQ conducted research with the University of Baltimore, which found that the epidemic of online fake news now costs the global economy $78 billion annually. The report, which analyzes the direct economic cost from fake news, also estimates fake news has contributed a loss in stock market value of about $39 billion a…

Informatiker dringend gesucht

Informatiker dringend gesucht

von Frauke Suhr – 20 NOV 2019 Der deutschen Wirtschaft fehlen weiterhin qualifizierte Fachkräfte. Im Oktober 2019 waren laut einer aktuellen Auswertung des IW Köln bundesweit rund 263.000 Stellen im MINT-Bereich unbesetzt. Seit 2014 hat sich diese Zahl fast verdoppelt, wie die Statista-Grafik zeigt. Vor allem gut ausgebildete Informatiker werden oft händeringend gesucht – sie…

China’s Zhejiang Processes $6B via Blockchain Medical Billing Platform

China’s Zhejiang Processes $6B via Blockchain Medical Billing Platform

China’s Zhejiang province has processed nearly $6 billion via a blockchain medical billing platform using Ant Financial’s blockchain technology, Chinese publication QNSB reports on Nov. 18. Successfully piloted in 2018, the blockchain-enabled platform allows citizens to make doctor’s appointments, get prescriptions as well as pay, record and store their medical bills online. At a local…

Ransomware Attack Hits Louisiana State Servers

Ransomware Attack Hits Louisiana State Servers

One click on a phishing email can be enough to stop the government Louisiana Governor John Bel Edwards on Monday revealed that a ransomware attack hit state servers, prompting a response from the state’s cyber-security team. The incident appears to have affected only some of the state’s servers, but the Office of Technology Services (OTS)…

US, Montenegro Plot Cyber Warfare Ahead of 2020 Elections

US, Montenegro Plot Cyber Warfare Ahead of 2020 Elections

A guard stands at the entrance of the Montenegrin Defense Ministry in Montenegro’s capital Podgorica Nov. 11. Deployed inside the sprawling communist-era army command headquarters in Montenegro’s capital, a group of elite U.S. military cyberexperts are plotting strategy in a fight against potential Russian and other cyberattacks ahead of the 2020 American and Montenegrin elections.…

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked

White-hat hackers using never-before-seen zero days against popular applications and devices – they competed at a two-day gathering in Chengdu. Hackers over the weekend successfully compromised widely used software and hardware–including browsers Safari and Chrome, D-Link routers and the Office 365 suite–using zero-day vulnerabilities at the annual Tianfu Cup gathering. The hacking competition, held in…

Proof-of-Authority Algorithm Use Cases Grow: From Pharma to Games

Proof-of-Authority Algorithm Use Cases Grow: From Pharma to Games

Blockchain it is not: the Proof-of-Authority (PoA) consensus algorithm does not require miners to be involved at all … and obviously forsakes on the 10-year proven test case against hacking and compromise of the PoW Blockchain. – TJACK While the proof-of-authority consensus algorithm is turning into perhaps one of the most mature versions of blockchain…

Americans are increasingly fearful of monitoring their online and offline activities

Americans are increasingly fearful of monitoring their online and offline activities

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information Executive Summary: Americans are increasingly fearful of monitoring of their online and offline activities, both by governments and private companies, a survey showed Friday. The Pew Research Center report said more than 60 percent of US adults believe it is impossible…

Cyberagentur kommt – mit strengen Auflagen

Cyberagentur kommt – mit strengen Auflagen

von Lina Rusch – veröffentlicht am 15.11.2019 Nach monatelangem Streit gibt es nun grünes Licht für die Cyberagentur. Die Auflagen für diese besondere GmbH sind allerdings streng. Und die Führungsfrage ist weiter offen – doch es zeichnet sich eine Personalie ab. Im Haushaltsausschuss ging gestern Abend der monatelange Streit zwischen den Koalitionsfraktionen zur Cyberagentur zu…