Latest Posts with security tag

security

160 Articles 1 Followers


A "Security" Paranoia

4 Aug 2020 1 minute read 0 comments Jelly Fish

Today I opened my Celsius Network app to copy a deposit address from there -- and guess what?! The app asked me to change my pin code from a 4-digit one to a 6-digit one!!!1 "WTF?!", you might ask, "What's your problem?" Right, it's not a big deal, a...

Cybersecurity Challenges for SMBs – Safety First podcast interview

1 Aug 2020 1 minute read 0 comments Matthew Rosenquist

Had a great time during the TUV SUD Safety First podcast interview talking about cybersecurity challenges for small and medium businesses.  We discussed threats, perceptions, and best practices.  The conversation turned to the challenges of major co...

aelf Officially Partners up with DVP

30 Jul 2020 2 minute read 0 comments aelf_blockchain

Aelf has officially entered into partnership with DVP (Decentralized Vulnerability Platform) to safeguard the blockchain industry.   The hacker bounty phase 2 was officially launched on July 16 with a bounty of up to 1,000,000 ELF. ...

IDB and OAS Report on Cybersecurity: Risks, progress and the way forward in Latin America and the Caribbean

29 Jul 2020 1 minute read 2 comments pedrobrito2004

Thanks to an email notification, I found out that the second edition of the Cybersecurity report in the region had already been published on the website of the Inter-American Development Bank, I must mention that the first edition of this report was...

Helping you to keep your accounts secure.. very important tips from eToro!!

28 Jul 2020 2 minute read 0 comments Ahmed Zaki

Because the biggest loser in any hacking or phishing operation is trusted sites and platforms, they are keen to constantly advise their users so that they are not exposed to phishing and fraud... But the stranger... some people do not care about the...

Self-Sovereignty and the Transformation of Online Security

23 Jul 2020 5 minute read 0 comments Status Community Updates

With the transition from a culture of customer service to self-sovereignty, our approach to security must adapt. Smartphones and the rapid adoption of mobile payments have enabled us to communicate and transact wherever we are, whenever we want. Howe...

PCI DSS Requirement 11: Conduct vulnerability scans and penetration tests

20 Jul 2020 1 minute read 0 comments bosluistepel

Due to defects and security issues on web servers, web browsers, email clients, computer software, operating systems, and server interfaces, your sensitive data could be exposed. Fulfilling requirement 6 of the PCI DSS regulations - installing securi...

The 10 Worst Cybersecurity Strategies

16 Jul 2020 1 minute read 9 comments Matthew Rosenquist

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who yo...

Cybersecurity Thought Leader Ranking for July 2020

14 Jul 2020 1 minute read 4 comments Matthew Rosenquist

I am excited to be recognized with such great cybersecurity though-leaders!  Now more than ever, cybersecurity is becoming a critical pillar to the proliferation of digital technology.  Trust in the devices and systems is crucial that people, compan...

Lessons To Take From The Ravencoin Inflation Attack

7 Jul 2020 2 minute read 1 comment Brennan

Ravencoin, a project listed in the top 100 on CoinMarketCap, was the latest cryptocurrency to suffer an attack on its network. A hacker managed to successfully exploit a vulnerability in the project's source code to increase the supply by roughly 1.5...