Today’s Reading(25 Nov 2019)

Could Google Be About To Break Bitcoin?

Google sent shockwaves around the internet last month when it was claimed the search giant had built a quantum computer able to solve formerly impossible mathematical calculations–with some fearing bitcoin could be at risk. Read more in

Internet world despairs as non-profit .org sold for $$$$ to private equity firm

At the end of last week, the Internet Society (ISOCannounced that it has sold the rights to the .org registry for an undisclosed sum to a private equity company called Ethos Capital. The deal is set to complete in the first quarter of next year.

The decision shocked the internet industry, not least because the .org registry has always been operated on a non-profit basis and has actively marketed itself as such. The suffix “org” on an internet address – and there are over 10 million of them – has become synonymous with non-profit organizations. Read more in

Recent top data breach: T-Mobile US hacked, Monero wallet app infected

T-Mobile US prepaid account holders got some unwelcome news this week when their wireless carrier admitted on Friday it was compromised by miscreants who would have been able to ogle customers’ personal information.

Bad Binder breakdown

Over on the Google security blog, exploit-tracker Maggie Stone has written a detailed dissection of an Android security hole known as Bad Binder aka CVE-2019-2215.

This fake software update tries to download malware onto your PC

Crooks have been hacking websites to deliver fake software update notices to more than 100,000 web users in an attempt to trick them into downloading malware that could take over their PCs. Read more in

How to Implement an Efficient Cloud Security Strategy: The Experts Guide

According to IBM, 98 percent of companies will be using multiple hybrid cloud environments by 2021. This trend isn’t surprising. There are many benefits to operating in the cloud such as improved productivity, an increase in elasticity and huge cost-savings, to name a few. However, we keep seeing a range of issues when it comes to cloud security. From open S3 buckets to a lack of identity access management, why are large organizations struggling to implement an efficient cloud security strategy? Read more in

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.