article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Energy and utility companies have been some of the most high-profile cyber attacks in recent memory, such as the May 2021 Colonial Pipeline attack or the Delta-owned Monroe Energy attack in November 2021. One particularly potent emergent technology for scammers is blockchain and the related cryptocurrency and NFTs.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Tatsuaki Okamoto, director of NTT Research’s Cryptography and Information Security (CIS) Lab , and Dr. Amit Sahai, professor of computer science at UCLA Samueli School of Engineering and director of UCLA Center for Encrypted Functionalities (CEF). But it took massive processing power to make Gentry’s crude prototype work.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Whether perceived or real, a lack of understanding about blockchain technology has slowed the adoption of advanced distributed database technology in the past decade. This functionality makes forging a record in a blockchain ledger extremely difficult at best. However, federal officials didn’t reverse the blockchain transaction.

article thumbnail

Centralized vs. blockchain: A head-to-head comparison of storage requirements

CGI

Centralized vs. blockchain: A head-to-head comparison of storage requirements. In an earlier blog post, we addressed blockchain energy dependency. This time we take a look at blockchain storage requirements. Three producers of residual heat deliver to an energy wholesaler. A blockchain implementation.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Affected information includes users’ names, email addresses, IP addresses and encrypted passwords. Nearly 20 million Cutout.Pro users’ data breached Cutout.Pro, an AI photo and video editing platform, has suffered a data breach. The threat actor, KryptonZambie, listed a 5.93 The fine is the largest the Garante has issued to date.