It's no surprise that cryptocurrency is attractive to hackers. Where there's money, there will be hackers. And there's a lot of money locked up in cryptocurrency. But, recently, cryptocurrency attacks are skyrocketing. So what is it that makes cryptocurrency so hackable? First of all, it's necessary to support the premise that these attacks have actually … Continue reading Why is Cryptocurrency So Often Hacked?
Do you know how many gigabytes are in an exabyte? Probably not because it's likely you've never even heard of an exabyte. That said, there was a time when a gigabyte was a distant dream. We are now on the exabyte horizon. Oh, by the way, if you're ever asked this question, 1 exatabyte = … Continue reading DNA Storage Moves Closer to Realization
When I first learned of this defense against Chinese scammers on a cybersecurity forum, I thought it was amusing but would probably have limited use. I was wrong. Many members of the forum commented on how useful this ploy was, so I thought I would give it a little more exposure in case someone gets … Continue reading How to Turn the Tables on Chinese Scammers
Back in April, Microsoft warned of a "unique 'form' of email delivery" that was delivering malware. These attacks used a company's own contact form, available on their company website, to generate fake emails with malicious links. At that time, Microsoft claimed that their own antivirus program, Microsoft Defender, had been upgraded to detect and block … Continue reading Companies Compromised by Their Own Contact Forms