Remove 2012 Remove Examples Remove Mining Remove Security
article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves. In Bitcoin, for example, a process known as “Proof-of-Work” (“PoW”) involves miners solving a difficult mathematical problem with powerful computers.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. Security firm FireEye dubbed that hacking blitz “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years.” Security analysts and U.S. Image: FBI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Decreasing Usefulness of Positive Visual Security Indicators (and the Importance of Negative Ones)

Troy Hunt

Remember when web security was all about looking for padlocks? — Scott Hanselman (@shanselman) April 4, 2012. No, of course we shouldn't trust it and it's a perfect example of where a positive visual indicator is, in fact, misleading. and a green padlock - must mean it's secure! ?? It has a padlock!

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.” ZB in 2012, and the forecast is a mind-boggling 175 ZB by 2025! IDC estimated the world created.16

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Today, let’s take a look back at cases related to cooperation, form of production, privilege and confidentiality disputes, social media related disputes and a key case regarding biometric security. BIOMETRIC SECURITY. 2012: Part 1 , Part 2 , Part 3 , Part 4. Perhaps you missed some of these? Now is your chance to catch up!

article thumbnail

Padlocks, Phishing and Privacy; The Value Proposition of a VPN

Troy Hunt

I want a "secure by default" internet with all the things encrypted all the time such that people can move freely between networks without ever needing to care about who manages them or what they're doing with them. I mean what's the remaining gap? But that shouldn't be that surprising given that only 2.3% We still have a way to go!

Privacy 143
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

In fact, those guys are all pretty good examples of the ability to build amazing things from the ground up and I'm sure that many of you reading this have sat down and started building something with the same enthusiasm as, say, Zuckerberg did with Facebook in 2004. Just over 2 years ago, my wife (Kylie) had spinal surgery.

Education 111