Latest Posts with security tag

security

279 Articles 2 Followers


Arpa Chain (ARPA) Big News expected 31.12.2020

31 Dec 2020 1 minute read 0 comments Stat1c

  TECHNICAL OVERVIEW: Secure Multi-party Computation (MPC) allows a set of parties to jointly compute a function over their inputs while keeping them private. The correctness of computation is verifiable even under majority malicious condition usin...

Prime and Probe Side Channel Cache Attack Intro

26 Dec 2020 1 minute read 0 comments tyler775

As part of my job tutoring people in Computer Science, I also tutor some people in computer security. One of the things I am currently tutoring a student in is a Prime and Probe attack. This is a type of side channel cache attack: an attack on a comp...

The CISO Dilemma - When Leadership Ignores Risks

24 Dec 2020 1 minute read 0 comments Matthew Rosenquist

What should a CISO do when the executive leadership chooses to ignore critical cyber risks?  If the C-Suite and board are well informed of imperative vulnerabilities and yet choose a path to ignore security, the CISO is put in a position where they...

Update on Honeygain Stops Working, Solution and Support Reply

23 Dec 2020 1 minute read 1 comment XTRM

A quick update for those wondering if there will be a future feature to give over those darn permissions to render built in Android and Apple security applications useless with Honeygain - reiterating that this is not a fault of Honeygain but manufac...

The SolarWinds hacks will likely dwarf the Ledger hack with future data leaks

23 Dec 2020 2 minute read 3 comments ircrp

  As the dust is slowly settling after the the recent public data leak of the Ledger hack, the recent reports on the SolarWinds hacks in the United States are reporting on several government agencies being compromised on top of an estimated up to 18,...

Encryption in the United States | The battle between Apple Inc. and the Federal Bureau of Investigations

22 Dec 2020 23 minute read 0 comments BudgetHolics

DISCLOSURE: This is a paper I wrote back in 2016. It looks at the Privacy vs. National Security Debate through a Human Geography Lense, hence the Harvard-style References  Introduction The history of the United States (US) has been traditionally...

Revolution in Personal Data Security

21 Dec 2020 3 minute read 4 comments Barslanhan

Nowadays, we are experiencing the peak of the Information and Technology age, the concept of Data emerges as the most important value. Issues related to the use, privacy and security of Personal Data are the biggest challenges facing digital markets....

Objectives of Nation State Cyber Attackers

21 Dec 2020 1 minute read 3 comments Matthew Rosenquist

It is important to look into the motivations of government orchestrated cyberattacks, such as SolarWinds, as understanding the threat-agent’s objectives can provide important insights to their long-term goals and potential next steps. Today I discus...

Solved: Honeygain Has Stopped Giving Credits - One Fix

19 Dec 2020 1 minute read 0 comments XTRM

It has been hectic over at Honeygain - the platform has seen a huge surge in demand so can be forgiven for some backend teething issues - in the case of the Honeygain App stopping crediting units, in the main this is not the fault of Honeygain but ma...

Who Controls Monero?

19 Dec 2020 1 minute read 0 comments gmoney777

Many cryptocurrencies are semi or fully centrally controlled, such as with XRP. In these systems, there is a centralized ledger that records all transactions. In other systems, there are network validators that approve transactions. In contrast, Mone...