Future Technologies

How Cryptojacking Could Harm Your IT Environment

Source: BizTech Malicious online actors can infect your organization’s computers with malware, turning them into cryptomining machines hunting for bitcoin and wasting energy in the process. The price of bitcoin, the most popular cryptocurrency, keeps zooming...

Persistent drive-by cryptomining coming to a browser near you

Malwarebytes by Jérôme Segura Since our last blog on drive-by cryptomining, we are witnessing more and more cases of abuse involving the infamous Coinhive service that allows websites to use their visitors to mine the...
video

Big Data and Analytics for National Security

https://youtu.be/2X8Ty4fT_no

Is China’s Dominance In Bitcoin Mining Coming To An End?

Source: bitconnect.co The bitcoin space has had a rough couple of weeks in Asia, with first China and then South Korea dealing what look to be pretty substantial blows to the advance of bitcoin and...

Getting smarter about making cities smart

Having had the privilege to have visited a number of cities throughout the world, I have learned that Chengdu is not Mexico City, Brussels is not Houston, Abuja is not Melbourne, and Johannesburg is...

Cyberwarfare: Royal Navy now training sailors to use AI and IoT to counter threats

The Royal Navy's training exercise, dubbed Information Warrior 17, will see forces trained for battle with tech weapons. The Royal Navy is all set to train its warriors on how to counter and conquer threats...

US army uses cyberwarfare to repulse simulated tank attack

The US army has reportedly successfully used cyberweapons and electronic warfare (EW) to repulse a simulated tank attack during a training exercise. The cyberweapons used during the exercise, which took place at the Army...

Infographic: IoT Cyber Security Concerns

Technology is moving forward at a rate we have never seen before. While the internet was something we once needed a computer to access, it can now be accessed on an endless number of...

Bigger than Mirai: Leet Botnet delivers 650 Gbps DDoS attack with ‘pulverized system files’

Earlier in the year, a huge DDoS attack was launched on Krebs on Security. Analysis showed that the attack pelted servers with 620 Gbps, and there were fears that the release of the Mirai...

NIST Calls Development of Quantum-Proof Encryption Algorithms

Quantum computers can perform operations much more quickly and efficiently even with the use of less energy than conventional computers, but that's bad news for encryption — a process which scrambles data according to...

Must Read

WP Facebook Auto Publish Powered By : XYZScripts.com

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close