Результатов: 292
Фото:

Researchers show how data science techniques can find Twitter ‘amplification bots’

Researchers from Duo Security, an authentication services company owned by Cisco Systems, have published a blog post that explains how to methodically identify “amplification bots. ” These are defined as automated Twitter accounts that purely exist to artificially amplify the reach of content through retweets and likes. дальше »

2018-12-11 17:00


South Korea Is Trialing Blockchain Voting — Here’s What That Means

South Korea will test out a new blockchain voting system this month, sources close to the developments have confirmed to Bitcoin Magazine. Developed by the country’s National Election Commission (NEC) and its Ministry of Science and ICT, the distributed ledger system is based on IBM’s Hyperledger Fabric and will be used to authenticate voters and save voting results in real time. дальше »

2018-12-4 21:41


Фото:

US government building tools to deanonymize anonymous cryptocurrencies

If you thought you were safe using privacy coins like Zcash and Monero you might want to think again. It appears that the US Department of Homeland Security (DoHS) is looking to develop forensic analysis techniques for privacy-focused cryptocurrencies like Zcash and Monero, according to a pre-solicitation document spotted by The Block. дальше »

2018-12-4 15:19


Фото:

Sketchy apps with more than 2 billion installs allegedly involved in click fraud

Chinese app developer Cheetah Mobile has been accused of running a major click fraud scam, using its Android apps which have a combined install base of more than 2 billion. BuzzFeed News reported that research from mobile analytics company Kochava found eight apps – seven from Cheetah Mobile and one from Kika Tech – misusing Android user permissions to gain referral earnings from app installs. дальше »

2018-11-27 13:13


Фото:

2FA codes are great for security, except when 26M of them are leaked

Just when you thought two-factor authentication was enough to secure your online accounts, a troubling discovery shows how this system can be comprised, thanks to human error. TechCrunch reports that a database of text messages containing more than 26 million 2FA codes, password reset links, and delivery tracking details was left out in the open … This story continues at The Next Web дальше »

2018-11-16 13:22


Target blames Bitcoin scam tweet on third-party app, not Twitter

American retail behemoth Target has come out to clarify that a tweet it posted, containing a link to a Bitcoin giveaway scam, came from a third-party software provider – not Twitter. In an email to Hard Fork, a company spokesperson said – contrary to what it suggested previously – Target’s Twitter account was never inappropriately accessed. дальше »

2018-11-15 14:12


Фото:

Alex Jones’ Infowars store was infected with credit card skimming software

Infowars is best known as the fake news platform used by beetroot-red nutjob Alex Jones to spout wild conspiracies and defame grieving parents. But did you also know it boasts an online store where you can buy vitamins, “neutraceuticals,” and garish right-wing t-shirts? I mention the retail bit because, according to ZDNet and Dutch security researcher, Willem de Groot, it was recently the site of a particularly nasty Magecart infection, which hoovered up the details of roughly 1,600 customers. дальше »

2018-11-14 12:59


Here’s why it is unsurprising that China, the US, and Russia didn’t sign the global cyber security pact

On Monday, French President Emmanuel Macron released an international agreement on cyber security principles at the Paris Peace Forum. While the pact was signed by 51 countries, 130 global companies and 90 charitable groups and universities, the five most notorious countries in cyber warfare refused to sign. дальше »

2018-11-14 22:44


Фото:

Apple confirms its T2 chip will block some third-party repairs

Apple yesterday confirmed that its new security chip T2 – which it uses in MacBooks launched this year – will prevent third-party repairs to some degree. Responding to a query from The Verge, the company verified that parts like the logic board and Touch ID components for the new Macbooks can’t be replaced by a third-party repair shop – and so you’ll have to visit an authorized Apple service center to get your laptops fixed. дальше »

2018-11-13 09:39


5 recent tactics criminals use to steal your Bitcoin (and other cryptocurrency)

While the cryptocurrency mania that drove Bitcoin’s price to $20,000 may have eased, the threat posed by the most experienced cybercriminals hasn’t disappeared. In fact, prominent information security firm Kaspersky Labs has detailed how some of the internet’s most well-known cyberthreats have evolved to better target cryptocurrency users and services. дальше »

2018-11-12 17:47


Фото:

8 expert predictions on what will define tech in 2019

If you’re a tech junkie, you’ve inevitably thought about what it would be like to run into your future self, even just a year from now. What apps would be on your phone? How would your user experience change? What’s the next big thing you won’t be able to imagine your life without? To find out we went to this year’s EIT Digital Challenge where some of Europe’s finest deep tech scaleups and late-stage startups were pitching cutting-edge solutions that will innovate everything from online security to our own personal well-being (see all 10 winners here). дальше »

2018-11-6 15:19