security

The First Malware Abuses DNS over HTTPS (DoH)

Recently, the idea of data privacy and security has gained a lot of traction. Legislation like the EU’s General Data…

5 Reasons to Adopt Multi-Factor Authentication in Your Organization

In the modern time of ever-evolving technology cybercriminals also become more inventive and therefore more dangerous. Having a protection system…

For Blockchain, ARPA’s Privacy Computing is the Next Big Thing.

Blockchain immutably records information, but ventures such as ARPA are committed to protecting business and people’s privacy. The first-ever privacy-computation…

Online versus offline business threats: What you should prepare for

While data theft and other digital attacks are so widespread, it isn’t as simple as legions of hackers targeting SMBs.…

Stellerro is set to issue tokenized equity through Spanish-regulated Security Token Offering (STO); Public sale opens June 17th

TEL AVIV, Israel, June 17th, 2019 -- Stellerro, an alternative investment banking platform, automated, in-scale, determined to bring liquidity to…

Next Generation Blockchain Protocol With Scalability, Security, And Extensibility: Interview with Fan Long, co-founder at Conflux.

Fan Long is a co-founder at Conflux, a next generation blockchain protocol with scalability, security, and extensibility, committed to integrating…

Why is Cybersecurity Important?

The internet is everywhere, in our PCs, phones, vacuum cleaners, streetlights; you name it. In fact, it helps keep us…

Cynet Introduces New Tool to Identify and Remove Cybersecurity Threats: Interview with Eyal Gruner, the CEO of Cynet.

Cynet recently announced a Free Incident Response (IR) Tool to remediate cybersecurity breaches. As pioneers in automated threat discovery and mitigation,…

Segurazo Detail the 5 Most Common Threats to Online Security

Systems administrators and computer users alike need to be vigilant about online threats. While a strong security suite like Segurazo can…

Security Tokens Require A Legal, Transparent Marketplace

In the coming months, projects may start issuing the first crop of cryptographic “security tokens”, a form of digital assets…

The Use and Market Size of Blockchain Technology in Supply Chain

Supply chain is now more daunting task than before. Gone are the days when this sector was relatively simple because…

MonitorChain and ContractLand Partnering on Next-Generation Exchange Security

The security of cryptocurrency exchanges has become a persistent concern since the infamous Mt. Gox hack in 2014 and the…

SIM Swapping and Personal Cryptocurrency Wallets

SIM Swapping has started emerging as a legitimate threat to personal financial information stored on users’ phones and to those…

An IoT B2B Security & logistics platform and A Distributed Ledger Alliance: Interview with Bruce Garcia, CEO of Conventment

Conventment is a SaaS company that creates software based on DLT solutions. The company offers an IoT-based B2B Security & logistics platform…

Exploring the Security Weaknesses of the Blockchain

Security weakness may appear uncharacteristic when written in the same sentence with blockchain. The distributed ledger has strong security features…

How Goldilock’s Air Gap Technology Will Redefine Digital Asset Security

In the past few decades, the world has been increasingly moving away from paper-based records to more permanent, digital alternatives.…

UKey card is a smart hardware Crypto Wallet with Biometric Security by Unikeys: Interview with CEO and Co-founder Alexandre Tabbakh

Unikeys has announced the launch of UKey card, a cold storage hardware wallet that employs biometric security and payment channels…

Unikeys announces the launch of UKey card, a Biometric Cold Storage Hardware Wallet

Unikeys introduces the UKey card, a smart hardware crypto wallet that employs biometric security and payment channels for lighting-fast transactions.…

Cryptojacking: The New Kid on the Malware Block.

Cybersecurity continues to be a major concern worldwide. Breaches and attacks increasingly expose personal and organizational data, and no one…