-
What is “Shadow IT”??
Wikipedia describes Shadow IT as: In big organizations, shadow IT (also known as embedded IT, fake IT, stealth IT, rogue IT, feral IT, or client IT) refers to information technology (IT) systems deployed by departments other than the central IT department, to work around the shortcomings of the central information systems. Shadow IT systems are an important source of innovation, and shadow systems may become prototypes for future central IT solutions. On the other hand, shadow IT solutions increase risks with organizational requirements for control, documentation, security, reliability, etc. via Wikipedia [1] My first thought after digesting some basic information is that Shadow IT sounds like people coming up with…
-
Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP
According to the Bleeping Computer new service, PHP’s Git server was hacked via a backdoor to the PHP source code. PHP is a general-purpose scripting language especially suited to web development. Typically a server-side programming language, PHP powers many sites on the internet including big players like Wikipedia and Facebook. In this latest attack the official PHP Git repository was hit and the code base was tampered with. Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server. The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf …
-
Protected: What is Equinix? And Why Are They So Important??
There is no excerpt because this is a protected post.
-
Post-Quantum Cryptography: The Race Is On
Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…
-
A 3-Tiered Approach to Securing Your Home Network
Some tips running from basic to advanced, on how to approach securing your home network from Daniel Miessler. via Daniel Miessler
-
Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…
A group of hackers say they gained access to live feeds of 150,000 security cameras inside hospitals, prisons, schools and companies, including a Tesla factory. The hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns,…
-
‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item
Kings of Leon reigned supreme the past two decades in music and they continue to revolutionize the industry with the release of their latest album as a NFT, or non-fungible token. (If you don’t know what NFTs are, you can still read on about this article, and just be aware that 1, there’s a lot to unpack and digest to really, fully understand what NFTs are, and 2, be advised that NFTs are “kind of a big deal” to many people. Also, Rolling Stone has a “quick” primer here.) Okay, back to Kings of Leon!!! By this move of releasing an album as an NFT they are one of the…
-
Blockchain Technology: In the News…
From an article on CNET: Forget Bitcoin: Inside the insane world of altcoin cryptocurrency trading Ironically, it’s blockchain, the behind-the-scenes technology, that could be the solution to the burgeoning deepfake problem. In cryptocurrency, the blockchain is an unalterable ledger that tracks every transaction. Once it’s on the ledger, it can’t be altered. That same technology can be used to track anything — like the creation and distribution of a video, from studio to iPhone screen. There are already startups working toward this, like Truepic. When I asked about blockchain’s ability to neutralize deepfakes, Inman-Grant wasn’t entirely optimistic. “It’s definitely an arms race, but it’s not an arms race we’re winning right now.” via…
-
Billions were stolen in blockchain hacks last year…
According to this article, the total value of the losses from 122 attacks in 2020 would be worth $3.8 billion today. We know how some hackers passed away their time during the lockdown: By running Bitcoin-related hacks and potentially netting “nearly $3.78 billion” in 2020, according to a report from Atlas VPN. Data collected by Slowmist Hacked showed that there were 122 attacks in 2020, targeting three major areas: –Decentralized apps running on the Ethereum platform had 47 attacks (current value $437 million) –Cryptocurrency exchanges had 28 attacks (current value $300 million in losses) –27 attacks on blockchain wallets Via ZDNet—Billions were stolen in blockchain hacks last year
-
Get ready for self-driving banks
This article from the Financial Times looks at the algorithms and blockchain technology that may be required for 21st century regulation. DeFi turns all this on its head. It leverages blockchain technology to deliver services with no human intermediation. One example is creating money markets with algorithmically derived interest rates based on supply and demand — rates that traditional banks set by committee. Other DeFi projects include decentralised exchanges that allow users to trade without brokers, and protocols for lending that do not involve loan officers or credit committees. Although these “self-driving banks” are new, they are not small. They are likely to be mainstream before self-driving cars start to…