Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - Nusrat Jahan Momo

Pages: 1 2 3 [4] 5 6
46

If you wish to make an apple pie from scratch invest in bitcoin, you must first invent the universe read this.

These are the true stories that teach you how to get cryptocurrency security so your endeavors into digital currency can have a happy ending.

Use the links below to jump to the one that best applies to you.

John heard about bitcoin and got curious

Sam just wanted more money

Luis was afraid of his government

The reason we’re offering advice about cryptocurrency security is this:

Cryptocurrency security should start with basic cybersecurity

Because Tyler Durden goes toe to toe with Tyler Durden

Remember when you first read about Bitcoin and heard the term “cryptocurrency”? You probably skipped past it. Or maybe you thought about buying a Bitcoin but you got a games console instead.

cryptocurrency security bitcoin is

After all, you’d have to be crazy to spend $10 on a single, invisible, intangible coin hawked by a few tech people. They always get excited about something and that excitement reaches a paroxysm which can end in tragedy like the dot.com boom or the acquisition of Instagram for more $$$ than a national GDP.

However, the years passed and cryptocurrency is here to stay, a movement spearheaded by bitcoin and its turbulent history. It’s a name now almost synonymous with blockchain technology.

Created in 2008 by the mysterious Satoshi Nakamoto, bitcoin is essentially digital money. It also cemented the “blockchain” concept in popular consciousness.

bitcoin comic new yorker

 

Source

This means it’s tracked by all those who own this money in a public ledger, promising unparalleled accountability and transparency. It appeals not just to anarchists, but to people like you and me. Its peer-to-peer concept defies central banks, corporations and, ideally manipulation, but it’s not invulnerable, something which we’ll explore further on.

The first story belongs to a friend of mine, let’s call him John.
John heard about bitcoin and got curious

Around six or so years ago, John got around 3 bitcoins just by being around Reddit. It was back when users used to tip each other with this cryptocurrency. One evening he was bored so he set-up a wallet. Reddit users found him cool, so they tipped him for insightful comments using Bitcoin.

It was a long time ago when he shared the story so my memory’s foggy about the exact circumstances in which he lost those coins.

I remember he forgot one password and it spiraled out of control from there.

brett hunter bitcoin art

Source

The way he told me, his Reddit account was connected to his Yahoo email. It was also there where he kept his wallet. He got another account on Reddit, as a lot of users do (alt-accounts are very popular), forgot about the coins for a few years, then woke up to the reality.

Bitcoin was huge. 3 bitcoins could secure him the trip of a lifetime or even a sizeable down payment on a car. His modest savings from working a 9-5 job were nothing compared to the value of bitcoin. He just needed to find his wallet and trade them for “real money”.

You see where this is going?

Yes, he first tried logging in to Reddit. Nada.

He went on Yahoo. Nada.

He tried to get info online on how to recover his accounts and his lost funds. Big, fat NADA.

He forgot his password for one website and it triggered a chain reaction resulting in losing A LOT of money.

Fortunately, he doesn’t really regret the experience, because he never got to hold those Bitcoins in his hand. They never jingled in his pocket or took a trip to the washing machine, forgotten in a jean pocket.

That money didn’t feel really real to him, so the loss hurt, but not that bad. Mark Fraunfelder from Wired felt differently when he forgot his Trezor password and lost $30,000 in Bitcoin.

My friend John thinks that most everyone who invested in cryptocurrency came out ahead, even though some experts have warned that this is a bubble or a multi-level marketing scheme.

He also watches the cryptocurrency news like a hawk, hoping for a second chance at buying Bitcoin at a low. And setting aside some money to buy Ether, just in case this cryptocurrency gains more ground. Hedging his bets, essentially.

Does he sound like you?

I know you’re here because you’re itching to invest in Bitcoin, Litecoin, Ether or Monero. I’m here to hopefully help you do so safely. I’m going to go more cryptocurrency stories like my friend John’s, as retold by incredible journalists at top tech publications. You will find insights into the wonderfully complicated and yet alluring world of cryptocurrency. You will also hopefully learn to take cybersecurity seriously because it’s not just important for your general data, but essential if you plan to invest in any type of cryptocurrency.

If you’re already intimately familiar with blockchain, the stories won’t reveal any more expert details about blockchain and cryptocurrency. What I hope they will do is teach you the importance of cryptocurrency security, of making sure you’re bulletproof against malicious hackers. Even my friend John could have avoided a lot of heartaches if he simply had good password practices.

You can follow this step-by-step password security 101 guide to not fall into the same trap as John.

After all, after risking your hard-earned money on a novel, complicated idea like blockchain, and hopefully after profiting from it, the last thing you want is to be hacked or lose your credentials in a stupid accident.
Sam just wanted more money

Perhaps every cryptocurrency adopter, you and I included, has a very simple reason for buying the digital coins. We’re all Sams wanting more money, because… capitalism. Malicious hackers want more money, too.

Here’s how they get it.

last supper bitcoin project

Source

Virtual currencies are a favorite target for malicious hackers because they hold value and have relatively weak security.

Furthermore, they’re unregulated.

The same draw cryptocurrencies pose to Tyler Durdens around the world is their downfall.

There is no higher authority to regulate the coin, so there is no higher authority to reverse fraudulent transactions. If you live in a country without any policies regarding cryptocurrency, where are you going to report a theft?

In one example of a bitcoin hack, bitcoin wallets got compromised by intercepting text messages, as detailed in this demonstration.

These SS7 attacks can affect large numbers of users, even those who had two-factor authentication. However, if you followed this guide and used an app like Google Authenticator, who generates one-time codes, you would be safe from this exploit.

A bitcoin hacking can happen to even the most tech-savvy of us. Take for example Chris Pool, aka moot, the founder of popular and controversial forum 4chan. He got hacked twice in a day, the attacker gaining access to his forum and Amazon cloud account, where he started mining Bitcoin.

bitcoin art cryptocurrency security

In one report, a Trojan made away with $140.000. In another, hackers got into one of the largest bitcoin exchanges in the world, gained access to the personal information of 31.800 users and stole over 1.2 billion won, just over $1mil.

One victim said that the attacker posed as an executive at Bithumb and phoned to say that he was “suspicious of a foreign hacking transaction,” asking the victim to provide further information. If that victim was more aware of social engineering, one favorite tactic from malicious hackers, this story could have had a happier ending. So, if you’re a Sam wanting to make a quick buck or a John investigating a new piece of tech, it’s still up to you to protect yourself from cyber attacks. If you’re a Luis, this is even more important. Here’s what to do:

cryptocurrency security guide how to protect phone identity surveillance

Source

    Learn all about password security and make sure yours are uncrackable by using a comprehensive guide
    For chat, use a chat app like Signal and an open-source or peer-verified tool that offers end-to-end encryption like OTR Messaging. Don’t rely on tools like Google’s “Go off the record”.
    Access the internet using a secure web browser like Tor
    If you can’t use Tor, choose an extension like HTTPS Everywhere from the Electronic Frontier Foundation and follow this guide to ensure browser security for all major browsers
    Always use VPN when connecting to other networks (eg: coffee shops)
    Keep the most sensitive data on a separate, encrypted hard drive or on an encrypted flash drive.
    For the flash drive, you can use BitLocker for Windows. If you want an open source solution, VeraCrypt is the way to go.
    For maximum security, use an air-gapped computer. This is a computer or a laptop never connected to the internet, where you can keep and work on your most sensitive data. Then encrypt that data, put it on a secure flash drive, then use it on your computer connected PC.
    If you’re part of a political or revolutionary movement who needs to use social media to spread awareness about the cause, another tactic to hide your presence is obfuscation.

More on that below, in Luis’ story.

As with all other cybersecurity measures, make sure you keep software updated and use anti-virus software to protect yourself from malware and other threats.
Luis was afraid of his government

According to this website, Luis is a name shared by 2.5% of Venezuelans, so it’s Luis we’ll be following in this tale on how Bitcoin and other cryptocurrencies can save people from another Great Depression.

Venezuela is currently going through the worst hyperinflation crisis since the Weimar Republic, and the situation is just as dire in Zimbabwe. Both countries have huge numbers of citizens buying and trading bitcoin in the hopes of riding out their country’s currency depreciation.

bitcoin art bitcoin miners cezanne inspiration youldesign

Source

Luis is living in Venezuela. Unbeknownst to him, the fact that he chose to save his money in Bitcoin has turned his country into the first bitcoinization of a sovereign state. In other words, at this pace, Venezuela could become a cashless society. Over 100.000 of its citizens are mining bitcoin, litecoin and other currencies as a way to survive the hyperinflation.

An average salary in Venezuela is around $40 per month. An average machine dedicated to mining cryptocurrency can produce 20-25 Litecoins per month, which is $920 in “real” money. Electricity is cheap.

This is how Venezuelans can survive in an economic climate where a Big Mac costs about half of a month’s paycheck, according to a troubling Atlantic story. However, the authorities do not like that. Socialist President Nicolás Maduro has said that those who profit off inflation are “capitalist parasites” and started cracking down on cryptocurrency mining.

    However, the country does not have laws on this, so the authorities find different ways of punishing people like Luis.

“If they find machines, they arrest the owners or they try to extort money. In electricity, we spend barely 15,000 bolivars a month (less than 50 cents at the black market rate),” said Veronica, a bitcoin miner just like Luis.

In this amazing article on the secret, dangerous world of Venezuelan bitcoin mining, reporter Jim Epstein relays how regular Venezuelans mining bitcoin have been targeted by the government.

“On March 14, two SEBIN officers showed up unannounced, according to Padrón, claiming that workers with the power company had detected high levels of electricity use at that address and demanding to search the premises. That afternoon he was taken into custody. Padrón would spend the next three and a half months in a SEBIN detention center, sharing a 230-square-foot cell with 12 other men.“

Authorities are arresting or blackmailing bitcoin miners using charges like contraband (for purchasing computer parts made in China without paying import tax), electricity theft or causing power outages.

As Tim Worstall highlights, this is hypocrisy at its finest. The government makes electricity cheap, almost free, to “help” citizens, citizens use that energy to earn money. The same government then arrests those citizens for stealing energy.

Luis from Venezuela and his compatriots are just one example of what bitcoin and cryptocurrency can do to a society. The good part is that it allows people to prosper even in harsh circumstances. They can isolate themselves from the effects of an economic crisis so dire that compatriots have been forced to kill flamingos and anteaters for subsistence.

The bad part is that it’s unregulated in most parts, unlawful in others. This can land cryptocurrency miners in really hot waters, if not directly in jail.
Cryptocurrency security should start with basic cybersecurity

Cryptocurrency security should start with basic cybersecurity, then advanced tools.

Living in fear of your own government brings about thousands of ways of avoiding that government. We can’t tell you how to evade the authorities by hiding in poor communities and hiring bodyguards like some Venezuelans are doing right now.

Our area of expertise is cybersecurity, so we will stress the importance of securing yourself against attacks from malicious hackers and spying from third-parties.

This cyber-security mega guide contains everything you need to know to stay safe online. It offers essential tools you need to encrypt your data, find the best VPN and secure messaging. It also includes the most valuable advice in protecting your income against malicious hackers just wanting a quick profit. Yes, you can be safe from prying eyes and organizations

Supplement the cybersecurity measures we outlined in Sam’s story and the guide above with a tactic called obfuscation.

liu bolin art

Source

If you are part of a “rebel” faction and need to spread awareness via social media, use Cory Doctorow’s book Little Brother as inspiration. Rely on obfuscation to protect yourself from scrutiny. In that book, the hero puts gravel in his shoes so he can walk differently and fool gait recognition systems.

In other methods, obfuscation simply means flooding surveillance technologies with a lot of meaningless or ambiguous information. A simple way would be to post ambivalent, random updates on social media with no connection to you, in the hope of confusing the algorithms behind those platforms.

Take advantage of the insights in Helen Nissenbaum and Finn Brunton’s book, which covers methods used by all sides of the conflict. The Obfuscation Workshop also offers some great resources. Here’s a wonderful idea from the Digital Society Forum: use a plugin like TrackMeNot. It hides Google searches by burying them in other random searches sent from the user’s IP address.

With these cybersecurity measures put in place and a good dose of obfuscation, you can protect yourself and your cryptocurrency investments from malicious parties.
Tyler Durden goes toe to toe with Tyler Durden

Bitcoin, hacking and indeed, most great stories contain essentially two sides of the same coin.

The same technology, the same promise, can still create a divide. And allow malicious hackers to gain another income stream: stealing bitcoin and other cryptocurrencies.

Untitled

Source

First, let’s hear Tyler Durden’s explanation of the popularity of cryptocurrencies.

No, not the Ikea-hating, soap-making, revolutionary-thinking hero from Fight Club, but the anonymous bloggers behind the respected finance blog Zero Hedge. Sure, they were obviously influenced by Palahniuk’s masterpiece.

“Given that bitcoin is better than gold in the short term and much better than the dollar in the long term across the dimensions we have described, it’s not surprising that people chose to diversify their money holdings into this independent currency due to frustration with the mismanagement of fiat money and manipulation of gold prices”, wrote one Tyler Durden in this article called “Is Bitcoin Money?”.

It highlights a big part of the mistrust people have in banks and governments. Bitcoin’s history, as highlighted in this infographic, is intrinsically tied to the 2008 global meltdown.

history of bitcoin 2008 meltdown

The government bailout of US banks and other incidents since have given birth to more and more opinions like these:

    “I believe in the hacker ethic. Empower the small guy, privacy, and anonymity, mistrust authority, promote decentralized alternatives, freedom of information,” said Amir Taaki, self-proclaimed anarchist and creator of DarkMarket.

It was a prototype for a decentralized online marketplace that was designed to resist take-down attempts by authorities.

DarkMarket never materialized because, as Wired reports again, Taaki took up the Rojavan Kurds’ cause, went to Syria and started fighting ISIS. The Rojavan Kurds charmed him with their progressive society based on direct democracy, collectivist anarchy, and equality for women. Motherboard paints a different picture, highlighting how Taaki took the fall for the largest Bitcoin hack so far.

Taaki is just one of thousands of people drawn to bitcoin because of its inherent anarchist ideals. We could call him a Tyler Durden, another person who internalized a few lessons from Fight Club.

eye of god bitcoin painting

Source

As The Guardian explained in an article, crypto-anarchists are mostly computer-hacking, anti-state libertarians who have been kicking around the political fringes for two decades, trying to warn a mostly uninterested public about the dangers of a world where everything is connected and online.

They’re also hardcore fans of the blockchain, celebrating cryptocurrencies like bitcoin. Opposite of them are companies like IBM, who attempt to regulate pot in Canada using blockchain. Enemies of all of them are malicious hackers testing the limits of cryptocurrency security.

Good hackers might pull Robin Hood moves to steal Bitcoin in order to finance the war against ISIS.

Bad hackers are targeting people like you and me using all the tools of the trade, relying on browser security flaws, smartphone exploits, and even good old spam mail campaigns that spread malware.

Malicious hackers targeting governments, corporations and small businesses alike with ransomware like Wannacry or NotPetya demand payment in bitcoin. Out of fear, those victims usually pay the ransom.

ransomware damage cyptocurrency security

And this is just the tip of the iceberg. When it comes to cybercriminals, it turtles all the way down. The same goes for malicious hacks and other illegal acts.

Just look at Theodore Price. He stole around $40-$50 million USD worth of bitcoins by replacing wallet addresses through malware. In a twist that boggles the mind, he got caught for stealing two laptops from his parents’ girlfriend.

Another face-palming bit of news: malicious hackers hacked the NSA hacking group, demanding $1 million in bitcoin ransom.
If you wish to make an apple pie from scratch invest in bitcoin, you must first invent the universe learn the basics.

The famous Carl Sagan quote applies in most kitchens. In this case, the universe is cybersecurity.

As you saw in the previous examples, blockchain, Ether, and other cryptocurrencies are here to stay. So are malicious hackers and other parties who will try to take advantage of your lack of awareness to rob you of your hard-earned (mined?) currency. They’re targeting you, your bank, your government and any area where they can find a cybersecurity flaw.

So spend a few hours securing your PC, your smartphone, and your IoT devices. It seems like a daunting task, but there are free, comprehensive courses that will teach you how to protect yourself from hackers in no time.



47
Social media Syndrome.  Everyone has it, there’s no doubt about that!

Each time you have a desire to share your thoughts or photos, promote your products/services or simply ask for something, you go on your favorite social network: Facebook, Twitter, Instagram, LinkedIn or Google Plus. Oh, wait! No one is on G+ anymore 🙂

Findings from a recent study found that 79% of those surveyed said they share life milestones on social media first.
For details visit this link https://heimdalsecurity.com/blog/dont-share-photos-of-kids-facebook/

48
Security / How to Easily Remove Malware from Your PC
« on: January 03, 2018, 10:29:27 AM »
Malware infection. Nobody wants that on their computer and almost everyone might think: “this can happen to me”. Until it does and you don’t know exactly what’s the first thing you should do.

Maybe you’ll call the IT guy, ask help from a friend or maybe try to disinfect the computer by yourself. Or maybe you want to address this issue on a security forum where other people encountered the same problems as yours and find a solution.

Warning symptoms: You noticed for a while that your PC started to slow down, crashes often, pop-ups appear randomly in your browser,  or you noticed unusual messages or programs that start automatically. These signs can tell that your computer might be infected with malware.

So, a malware infection has taken your computer prisoner: What do you do now?

For details go to this link https://heimdalsecurity.com/blog/malware-removal/

49
Here’s a scenario you may not like, but could happen every day, because it’s always viruses season for computers. You’re working on an important project and suddenly start noticing annoying pop-ups displayed on your computer. Also, it takes too long for your files or computer apps to load. You wait and wait until you start asking yourself:

 “Does my computer have a virus?”

Unfortunately, the answer might be “yes” and your computer could be already compromised with viruses or advanced malware that are slowing down its activity and performance.

This is one of the signs that show your PC might suffer from a malware infection. There are more of them you need to be aware of and understand, so you can quickly take action.

In this article, we’ll show you the most frequent warning signs of malware infection and what can you do about it.

Quick links with what you’ll find out:

1. My computer applications run slow lately and it takes longer than usual to start
2. I keep getting annoying ads that are opening randomly or strange messages on my computer’s screen
3. My laptop keeps crashing when I watch Youtube videos or play games. It simply freezes, then a blue screen shows up
4. I started getting this popup message <you’re running out of disk space on Windows (C:)
5. For quite some time, every time I start my PC, I notice that the Internet traffic suspiciously increases
6. My homepage has changed and I don’t remember doing it myself
7. My PC is acting weird because I get unusual messages that appear unexpectedly.
8. I use an antivirus product and keep getting the message that
9. My friends tell me they’re getting strange random messages from me on Facebook, which I didn’t send
10. There are these new, yet unfamiliar icons on my desktop that I don’t recognize
11. Sometimes I see unusual error messages displayed on my computer
12. It seems that I can’t access my Control Panel by clicking on the button
13. Everything seems to work perfectly on my PC. Are any chances to be paranoid and still check for malware?

50
Weekly Security Roundup
The most important cyber security news of the week, hand-picked and summed up

This week we published a security alert about a new wave of spam campaigns containing the Emotet banking trojan that can exploit Windows admin rights on users’ PC. We also included a protection guide to better fight against these online threats.

We’ve updated our article with the most frequent warning signs of malware infection and what can you do about it. Do you recognize any of these scenarios? Be careful and take all the security measures needed. 

51
Malware authors continue to look for innovative techniques to spread malware and infect users’ computer. This year, exploit kits were one of the most common methods of infection used by cyber criminals to execute malicious code and take control of PCs and systems.
Source: https://heimdalsecurity.com/blog/

52
Security / Schneier on Security
« on: January 03, 2018, 10:21:22 AM »
Bruce Schneier is also a well-known name in this field, and was even called a “security guru” by The Economist. He wrote books, hundreds of articles, essays and security papers on security matters. At the same time, he is a known figure in the media.

The press recognizes him as an important voice for online security, not only for his knowledge on the matter, but also because of how he expresses his opinions.
Source:HEIMDAL Security

53
Vulnerability / Gaming addiction classified as disorder by WHO
« on: January 03, 2018, 09:52:27 AM »
Gaming addiction is to be listed as a mental health condition for the first time by the World Health Organisation.

Its 11th International Classification of Diseases (ICD) will include the condition "gaming disorder".

The draft document describes it as a pattern of persistent or recurrent gaming behaviour so severe that it takes "precedence over other life interests".

Some countries had already identified it as a major public health issue.

Many, including the UK, have private addiction clinics to "treat" the condition.

The last version of the ICD was completed in 1992, with the new guide due to be published in 2018.

The guide contains codes for diseases, signs and symptoms and is used by doctors and researchers to track and diagnose disease.

It will suggest that abnormal gaming behaviour should be in evidence over a period of at least 12 months "for a diagnosis to be assigned" but added that period might be shortened "if symptoms are severe".

Symptoms include:

    impaired control over gaming (frequency, intensity, duration)
    increased priority given to gaming
    continuation or escalation of gaming despite negative consequences

Dr Richard Graham, lead technology addiction specialist at the Nightingale Hospital in London, welcomed the decision to recognise the condition.

"It is significant because it creates the opportunity for more specialised services. It puts it on the map as something to take seriously."

But he added that he would have sympathy for those who do not think the condition should be medicalised.

"It could lead to confused parents whose children are just enthusiastic gamers."

He said he sees about 50 new cases of digital addiction each year and his criteria is based on whether the activity is affecting basic things such as sleep, eating, socialising and education.

He said one question he asked himself was: "Is the addiction taking up neurological real-estate, dominating thinking and preoccupation?"

Many psychiatrists refer to the Diagnostic and Statistical Manual of Mental Disorders (DSM), the fifth edition of which was published in 2013.

In that, internet gaming disorder is listed as a "condition for further study", meaning it is not officially recognised.

Lots of countries are grappling with the issue and in South Korea the government has introduced a law banning access for children under 16 from online games between midnight and 06:00.

In Japan, players are alerted if they spend more than a certain amount of time each month playing games and in China, internet giant Tencent has limited the hours that children can play its most popular games.

A recent study from the University of Oxford suggested that, although children spend a lot of time on their screens, they generally managed to intertwine their digital pastimes with daily life.

The research - looking at children aged eight to 18 - found that boys spent longer playing video games than girls.

Researcher Killian Mullan said: "People think that children are addicted to technology and in front of these screens 24/7, to the exclusion of other activities - and we now know that is not the case."

"Our findings show that technology is being used with and in some cases perhaps to support other activities, like homework for instance, and not pushing them out," he added.

"Just like we adults do, children spread their digital tech use throughout the day, while doing other things.
Source:bbc news

54
Security / Hacking the House: do MPs care about cyber-security?
« on: December 12, 2017, 09:26:07 AM »
What's the cyber-security policy in your organisation? Is it common to share login passwords with your colleagues? Because that's how it works in the House of Commons - according to one MP at least.

Responding to the row over just who might have had access to Damian Green's computer - and therefore potentially used it to view pornography - Nadine Dorries tweeted this:

"My staff log onto my computer on my desk with my login everyday. Including interns on exchange programmes. For the officer on @BBCNews just now to claim that the computer on Greens desk was accessed and therefore it was Green is utterly preposterous !!"
Source:bbc news

55
Latest Technology / Apple Mac security issue may reoccur
« on: December 12, 2017, 09:24:35 AM »
A software fix Apple released to close a serious Mac security bug may not have fixed the problem on some machines.

The bug meant anyone with physical access to a Mac running High Sierra could get admin access to the machine.

Wired magazine has found that the bug returns if Mac owners upgrade to the latest version of High Sierra after applying the patch.

Apple issued an apology for the appearance of the bug saying its users "deserved better".
Proper patch

The bug let anyone obtain high-level access to a Mac simply by typing the username "root" and leaving the password field blank.

The problem was present on Mac computers running version 10.13. and 10.13.1 of the latest version of Apple's operating system known as High Sierra.

Apple produced a patch to close the loophole less than a day after it was first reported.

Now it has emerged that the order in which people installed updates and patches for their Mac can mean the problem is not fixed.

The bug would still be present on a Mac that:

    was running High Sierra 10.13
    applied the security patch
    upgraded to High Sierra 10.13.1
    had not been rebooted

"You could easily have someone who doesn't reboot their computer for months," Thomas Reed, a security researcher at Malwarebytes, told Wired. "That's not a good thing."

Writing in Wired, Andy Greenberg said it was "not clear" how many users might be exposed by this particular set of circumstances.

Apple has yet to respond to a request for comment about the circumstances under which the root bug would reappear.

However, Apple's support page about the loophole stresses the importance of making sure that the security patch is "applied properly".
Source:bbc news

56
IT Forum / UK government mulls Bitcoin regulation
« on: December 05, 2017, 09:07:19 AM »
Anti-money laundering regulations should be updated to include Bitcoin and other virtual currencies, the UK Treasury has said.

The Metropolitan Police says criminals are using crypto-currency cash machines to launder money in London.

The government's aim is part of a broader update to the EU rules which are under negotiation.

The update, revealed in Parliament last month, would mean that traders would no longer be able to operate anonymously.
'Self-police'

Bitcoin expert Dr Garrick Hileman, a research fellow at the University of Cambridge, said that in jurisdictions such as New York, crypto-currency is already subject to tighter regulation.

"I think these announcements have a powerful signalling effect and put the industry on notice that the 'cop on the beat' is concerned and watching crypto-currencies more closely now," he said of the Treasury news.

"This in turn will motivate companies to more effectively self-police bad actors."

At a press briefing, Scotland Yard warned about the currencies' popularity among criminals.

"Organised criminal groups have been early adopters of crypto-currencies to evade traditional money laundering checks and statutory regulations," said Det Supt Nick Stevens, from the Serious and Organised Crime Command.

"Criminals have also used crypto-currencies to purchase illegal commodities on dark market sites with anonymity."

A Treasury spokesman said that there were already "clear tax rules" for legitimate crypto-currency users.

"We also intend to update regulation to bring virtual currency exchange platforms into anti-money laundering and counter-terrorist financing regulation," he added.
Bitcoin billionaires

The value of Bitcoin has continued to climb after reaching a landmark value of $10,000 (£7,400) and at the time of writing was trading at more than $11,200.

Bank of England deputy governor Sir Jon Cunliffe has advised people to "do their homework" before investing.

"People need to be clear this is not an official currency. No central bank stands behind it, no government stands behind it," he told the BBC last week.

US twins Cameron and Tyler Winklevoss are reported to have become the world's first Bitcoin billionaires, having invested $11m in the currency in 2013.

That stake would now be worth $1.01bn, according to The Times.

The brothers settled a legal dispute with Facebook in 2011 after claiming that Mark Zuckerberg stole their idea for a social network.
Source:bbc news

57
History & Latest Cyber crime / Apple Mac security issue may reoccur
« on: December 05, 2017, 09:04:25 AM »
A software fix Apple released to close a serious Mac security bug may not have fixed the problem on some machines.

The bug meant anyone with physical access to a Mac running High Sierra could get admin access to the machine.

Wired magazine has found that the bug returns if Mac owners upgrade to the latest version of High Sierra after applying the patch.

Apple issued an apology for the appearance of the bug saying its users "deserved better".
Proper patch

The bug let anyone obtain high-level access to a Mac simply by typing the username "root" and leaving the password field blank.

The problem was present on Mac computers running version 10.13. and 10.13.1 of the latest version of Apple's operating system known as High Sierra.

Apple produced a patch to close the loophole less than a day after it was first reported.

Now it has emerged that the order in which people installed updates and patches for their Mac can mean the problem is not fixed.

The bug would still be present on a Mac that:

    was running High Sierra 10.13
    applied the security patch
    upgraded to High Sierra 10.13.1
    had not been rebooted

"You could easily have someone who doesn't reboot their computer for months," Thomas Reed, a security researcher at Malwarebytes, told Wired. "That's not a good thing."

Writing in Wired, Andy Greenberg said it was "not clear" how many users might be exposed by this particular set of circumstances.

Apple has yet to respond to a request for comment about the circumstances under which the root bug would reappear.

However, Apple's support page about the loophole stresses the importance of making sure that the security patch is "applied properly".
Source:bbc news

58
History & Latest Cyber crime / Tech Tent: Apple's security under scrutiny
« on: December 03, 2017, 04:04:36 PM »
Apple: the root of the problem

For a long time, Apple has boasted - with some justification - that it has an excellent record of keeping its devices safe from intruders. In any case, with PCs having the lion's share of the computer market, hackers and security researchers used to spend little time hunting down vulnerabilities in Macs.

But on Tuesday a Turkish software developer tweeted this: "Dear @AppleSupport, we noticed a *HUGE* security issue at MacOS High Sierra. Anyone can login as 'root' with empty password after clicking on login button several times."

It sounded unlikely but it was true. What it meant was that anyone who got hold of an Apple computer running the latest operating system could get root access to the machine with very little trouble.
Source:bbc news

59
Technology News / Black Friday and Cyber Monday shopping: Top tips
« on: November 28, 2017, 11:40:08 AM »
Black Friday is well under way and the bargains will flow thick and fast all weekend - right up until the next sales peak on Cyber Monday.

Analysts Kantar predict UK shoppers will spend on average £246 ($327) each during the big event this year, with those in the US splashing out a marginally more restrained $298.

As always, tech hardware bargains are proving popular on Amazon with the retail giant naming the Nintendo Switch, a combi-drill from Bosch and of course its own Fire TV Stick among its most popular items so far.

John Lewis said it was averaging 19 sales per minute of a smart speaker by Sonos during Black Friday morning.
source:bbc news

60
Technology News / Imgur confirms 1.7 million users hit by data breach
« on: November 28, 2017, 09:35:15 AM »
Image-sharing website Imgur has confirmed that the emails and passwords of 1.7 million users were compromised in 2014.

The data breach has only recently come to light after being discovered by security researcher Troy Hunt.

Mr Hunt said he was impressed with the company's swift response.

Imgur said in a statement that no other personal data had been taken as it did not collect information such as real names and phone numbers.

"We apologise that this breach occurred and the inconvenience it has caused you," wrote Roy Sehgal, Imgur's chief operating officer, in a blog post.

Mr Sehgal said Imgur was "still investigating" but its former encryption method - a hashing algorithm - may have been "cracked with brute force".
That algorithm had been replaced in 2016, he added.

"We recommend that you use a different combination of email and password for every site and application," he wrote.

"Please always use strong passwords and update them frequently."

Troy Hunt tweeted that Imgur had released a statement 25 hours after he had contacted the company.

"This is really where we're at now: people recognise that data breaches are the new normal and they're judging organisations not on the fact that they've had one but on how they've handled it when it's happened," he wrote.

This month it was revealed that ride-hailing app Uber had concealed a 2016 data breach affecting 57 million users and drivers.

It also admitted to paying the hackers $100,000 (£75,000) to delete the stolen data.

"None of this should have happened," said chief executive Dara Khosrowshahi.
source:bbc news

Pages: 1 2 3 [4] 5 6