Latest Posts with security tag

security

319 Articles 2 Followers


Encryption in the United States | The battle between Apple Inc. and the Federal Bureau of Investigations

22 Dec 2020 23 minute read 0 comments BudgetHolics

DISCLOSURE: This is a paper I wrote back in 2016. It looks at the Privacy vs. National Security Debate through a Human Geography Lense, hence the Harvard-style References  Introduction The history of the United States (US) has been traditionally...

Revolution in Personal Data Security

21 Dec 2020 3 minute read 4 comments Barslanhan

Nowadays, we are experiencing the peak of the Information and Technology age, the concept of Data emerges as the most important value. Issues related to the use, privacy and security of Personal Data are the biggest challenges facing digital markets....

Objectives of Nation State Cyber Attackers

21 Dec 2020 1 minute read 3 comments Matthew Rosenquist

It is important to look into the motivations of government orchestrated cyberattacks, such as SolarWinds, as understanding the threat-agent’s objectives can provide important insights to their long-term goals and potential next steps. Today I discus...

Solved: Honeygain Has Stopped Giving Credits - One Fix

19 Dec 2020 1 minute read 0 comments XTRM™

It has been hectic over at Honeygain - the platform has seen a huge surge in demand so can be forgiven for some backend teething issues - in the case of the Honeygain App stopping crediting units, in the main this is not the fault of Honeygain but ma...

Who Controls Monero?

19 Dec 2020 1 minute read 0 comments gmoney777

Many cryptocurrencies are semi or fully centrally controlled, such as with XRP. In these systems, there is a centralized ledger that records all transactions. In other systems, there are network validators that approve transactions. In contrast, Mone...

eBay Protection Messed Up - Here Is Why - December 2020

17 Dec 2020 1 minute read 0 comments XTRM™

This would normally be an email consignment that is dropped in File-13 as some kind of eBay Scam or the like that fraudsters get up to involving eBay - However this mess up is Official from eBay dot com. If you have an eBay account - just nip into th...

Server Room Safety and Security Consideration Case Study Server Room GDLN UNUD 2012

7 Dec 2020 14 minute read 4 comments 0fajarpurnama0

Note This is my undergraduate assignment already in English in the Environmental Studies and Occupational Health & Safety course and I remembered that I was asked to write in Indonesian next time due to that time, English language was not yet support...

Some Justice for Phone Scammers

3 Dec 2020 1 minute read 9 comments Matthew Rosenquist

You know those spam calls that threaten money is owed to the IRS and if you don’t pay over-the-phone you will be arrested?  How about the call that the US Immigration will deport you if you don’t pay.  All annoying scams.  But, highly profitable for...

Are Your Communications Safe?

2 Dec 2020 1 minute read 10 comments CryptoVS

So you have your seed phrase or wallet key written down,  and you have put them away for safe keeping until you are ready to cash out on the next moonshot . You have your Ledger, or Trezor loaded with your Hodl bags locked away in your safe and now y...

KYC verification and its risks

1 Dec 2020 2 minute read 2 comments Itsrich

Well, personally I think this is quite an important topic to discuss, because everyone should give great importance to their identity. At present it is almost a custom to carry out the KYC verification, even the most paranoid users have come to carry...