Under the Hoodie 2018: Lessons from a Season of Penetration Testing

Under the Hoodie 2018: Lessons from a Season of Penetration Testing

Executive Summary This paper presents the results of 268 engagements (251 of which involved live, production network tests), conducted from early September of 2017 through mid-June of 2018. Fifty-nine percent of all penetration tests performed in the survey period were externally based, where the targets tend to be internet-facing vectors such as web applications, email…

Ethereum Co-Founder Names Berlin as The Most Important City in The ‘Blockchain Cosmos’

Ethereum Co-Founder Names Berlin as The Most Important City in The ‘Blockchain Cosmos’

Ethereum co-founder Joseph Lubin referred to Berlin as “the most important city in the blockchain cosmos”, Cointelegraph auf Deutsch reported July 25. Lubin said that, “Berlin has the infrastructure, Berlin has the talent, the really good programmers are here.” Lubin added that, if Berlin wanted to maintain its status as a blockchain hub,  “the government…

‘The best piece of legislation’ in DC is about Quantum Computing

‘The best piece of legislation’ in DC is about Quantum Computing

Congressman Will Hurd warned that Russia and China are sucking up encrypted communications in the hopes of retroactively reading them after they achieve encryption-breaking quantum computing capabilities. (AP Photo/Pablo Martinez Monsivais)   A Texas congressman warned of the growing threat quantum computing presents if competitors such as Russia or China achieve the technological feat first.…

Most ICOs Retain Centralized Control, Break Whitepaper Promises, Academic Report Shows

Most ICOs Retain Centralized Control, Break Whitepaper Promises, Academic Report Shows

Initial Coin Offerings (ICO) “failed” to provide protection against insider trading or stick to their whitepaper promises, a new report from the University of Pennsylvania Law School released July 17 reveals. The lengthy study of the ICO phenomenon, dubbed “Coin-Operated Capitalism,” begins with a frank appraisal of investor expectations versus reality, the four contributing professors…

Latest Hardware Needed: Cloud Mining Platform HashFlare Stops Services, Disables Equipment on SHA-256 Contracts

Latest Hardware Needed: Cloud Mining Platform HashFlare Stops Services, Disables Equipment on SHA-256 Contracts

Cloud cryptocurrency mining service HashFlare announced July 20, that it is stopping mining services and shutting down hardware on current SHA-256 contracts due to difficulty generating revenue. HashFlare is a cloud cryptocurrency mining platform founded in 2013. Cloud mining is a system where a user purchases a portion of the mining power of hardware hosted…

Blockchain Phones Calling the Future of Telecommunications

Blockchain Phones Calling the Future of Telecommunications

The emergence of blockchain technology has piqued the interest of a number of different sectors across global society. From finance, politics, economics, automotive and technology, blockchain is starting to take root. It is now being seen that communications could be the latest sector to benefit from this technological revolution. There has been a predictive report…

FUD? Newly Launched Bitcoin Optech Initiative Also Aims to Address BTC Scalability Issue

FUD? Newly Launched Bitcoin Optech Initiative Also Aims to Address BTC Scalability Issue

A team of Bitcoin (BTC) engineers has announced the launch of the Bitcoin Operations Technology Group (Bitcoin Optech) addressing the problem of Bitcoin’s scalability, according to their statement published July 20. Bitcoin Optech is a non-profit organization backed by leading industry players like PayPal Board Member Wences Casares, executive of Kohlberg Kravis Roberts & Co.…

Google: 2FA/U2F Security Keys Neutered Employee Phishing

Google: 2FA/U2F Security Keys Neutered Employee Phishing

A YubiKey Security Key made by Yubico. The basic model featured here retails for $20 The basic idea behind two-factor authentication (2FA/U2F) is that even if thieves manage to phish or steal your password, they still cannot log in to your account unless they also hack or possess that second factor.   by Brian Krebs…

A “Cyber Axis of Evil” is Rewriting the Cyber Kill Chain

A “Cyber Axis of Evil” is Rewriting the Cyber Kill Chain

Survey of Incident Responders Shows That Businesses Needs to Re-architect Cybersecurity The cyber kill chain employed by advanced adversaries is changing. Defenders need to evolve their defensive strategies to meet the new challenge; and they need to develop silent hunting skills. A new study from Carbon Black queried 37 incident response firms that use its…

Canada: Russian-Backed Bitcoin Miner Hut 8 Becomes ‘Largest’ by Capacity After Second Site Opening

Canada: Russian-Backed Bitcoin Miner Hut 8 Becomes ‘Largest’ by Capacity After Second Site Opening

Toronto-based Bitcoin mining company Hut 8 has announced the completion of its second mining facility in Canada on July 16, claiming to have become the world’s “largest publicly-traded” operator by capacity. In a press release, Hut 8 revealed its Medicine Hat farm had been completed ahead of its September deadline, joining its existing operation in…

“SDI” #2? Quantum Entanglement: Sorting Hype from Reality in China’s Quantum-Tech Quest

“SDI” #2? Quantum Entanglement: Sorting Hype from Reality in China’s Quantum-Tech Quest

Could the “spooky action” of quantum technologies enable China to develop disruptive military capabilities – and perhaps achieve a strategic advantage? In its quest to offset U.S. techno-strategic advantages, China aspires to emerge as a “science and technology superpower” (科技强国) and leap ahead in quantum science through a new national megaproject. From the launch of the world’s…

Blockchain Odometer Security: Wie Blockchain die Manipulation von Tachos bekämpft

Blockchain Odometer Security: Wie Blockchain die Manipulation von Tachos bekämpft

Die Deutschen „frisieren“ gerne: Während europaweit nur zwölf Prozent aller Gebrauchtwagen einen gefälschten Tachostand aufweisen, sind es hierzulande 33 Prozent. Laut dem ADAC steigt der Preis eines gebrauchten Autos um durchschnittlich 3.000 Euro, wenn der Tacho mit einem Manipulationsgerät bearbeitet wurde. Lösungen gibt es für diese Betrugsmasche bislang kaum. In Belgien und den Niederlanden setzt…

Bitcoin Mining Firms Make Chinese Unicorns List for First Time: Bitmain, Canaan Creative and Ebang

Bitcoin Mining Firms Make Chinese Unicorns List for First Time: Bitmain, Canaan Creative and Ebang

Bitmain at $10.4 billion Canaan Creative at $3 billion Ebang at $1.5 billion   Three bitcoin mining companies have joined a list of “unicorns” – private companies valued at over $1 billion – for the first time. The Shanghai-based Hurun Research Institute published its Q2 Unicorn Index for the Greater China region on Wednesday, which notably…

The US Department of Defense plans to spend $1.7 billion for new Joint Artificial Intelligence Center

The US Department of Defense plans to spend $1.7 billion for new Joint Artificial Intelligence Center

Here’s how much a new artificial intelligence center could cost The Department of Defense plans to spend $1.7 billion over the next five years to stand up a new Joint Artificial Intelligence Center, according to new budgeting figures. The reprograming documents sent to Congress, obtained by C4ISRNET sister publication Defense News, outline the Pentagon plans…