Monday, April 30, 2018

How Vulnerable are Cryptocurrency Wallets to DNS Attacks?

Friends, as we now know countless of Myetherwallet users began to report suspicious activity on April 24, 2018 when trying to access the web-based Ethereum interface. As the web’s most popular client-side Ethereum wallet, MEW is widely used for buying Cryptokitties, sending money to crowdsales and beyond. BGP (Border Gateway Protocol) messages to the internet's core routers to convince them to send traffic destined for some of AWS's servers to a renegade box in the US. The rogue machine then acted as AWS's DNS service, and gave out the wrong IP addresses for MyEtherWallet.com, pointing some unsuspecting visitors to the dot-com at a phishing site that stole their money. Bottom line: Just how vulnerable are today’s Cryptocurrency wallets to DNS and related cyber attacks? The April 24 event not only sent shockwaves through the MEW community but also calls into question of the integrity of the broader Cryptocurrency juggernaut. Send us your comments today! Lawrence, Cyber Security Defender (https://cybersecuritydefender.blogspot.com

Will Byzantine Fault Tolerance Enable Blockchain Adoption Beyond Cryptocurrencies?

Friends, Byzantine fault tolerance (BFT) is the resistance of a fault-tolerant computer system, especially distributed computing systems, towards electronic component failures where there is imperfect information on whether a component is failed. In a "Byzantine failure", a component such as a server can inconsistently appear both functioning and failed to failure-detection systems, presenting different expressions to different observers. Perhaps nowhere is BFT more essential than on a Blockchain. Most traditional distributed computing environments have central configuration databases or authorities that can help right wrongs in the event that Byzantine failures occur. Blockchain applications, starting with Bitcoin’s Proof-of-Work consensus method, are today proposing solutions to this challenge. Can BFT and/or dBFT help solve this dilemma? Send us your comments. Lawrence, Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com)

Sunday, April 29, 2018

Vladimir Putin-The World’s Most Dangerous Man (on the Kindle Store)

Vladimir Vladimirovich Putin – The World’s Most Dangerous Man is the latest ebook from Genesys Publishing. We will examine A Definition of Danger in the 21st Century, Candidates for the World's Most Dangerous Man, Putin's Pathology, Putin’s Motives and Goals, Putin’s Means and Measures, Putin’s Willingness and Propensities, Putin - A Foreshadow of the anti-Christ, Counter-Measures, Slaying the Red Bear, Conclusions along with Recommended Reading and Supplemental Resources. Our conclusion is based on our assessment that Putin has the Motives, Means and Willingness to undermine the very sovereignty of free and western democracies. The time to implement a powerful array of counter-measures is today in order to preserve our rights to life, liberty and the pursuit of happiness for years to come. Order your copy today on the Kindle Store (https://www.amazon.com/-/e/B06Y3GLT8W). Lawrence, Cyber Security Defender

Putin's Kremlin-Epicenter of Global Cyber Warfare (on the Kindle Store)

Putin's Kremlin - Epicenter of Global Cyber Warfare: This goal of this eBook is provide a wake-up call for the new US government’s executive leadership, however well intentioned, yet seemingly naïve, that Russian cyber warfare is a clear and present danger to national security. Key topics include An Historical Primer on Russia' Leaders, Putin’s Pathology, The Era of Cyber Warfare, Russia’s Deception, Russia’s Goals and Methods, Russia’s Cyber Proxies, Russia’s Cyber Impact, Building the Great Wall of Cyber Security, Slaying the Red Cyber Bear, Concluding Thoughts, Supplemental Cyber Resources and Cyber Intelligence Feeds. The central premise of this codex is that Russia, as led by President Vladimir Putin, has the motive, resources and infrastructure to wage cyber war against free and democratic nations, chiefly the United States, for the primary purpose of regaining its global military dominance it had prior to the collapse of the former Soviet Union. Order today on the Kindle Storehttps://www.amazon.com/dp/B06XTYGJXF

WikiLeaks Exposed - Balancing Free Speech with National Security

WikiLeaks Exposed - In the era of WikiLeaks, Julian Assange, Edward Snowden and hardened cyber security, how do free and democratic nations balance the rights of their citizens with national security? WikiLeaks Exposed seeks to shed light on the motivations of its founder, funding sources, media partners, and the use of cyber technology to protect leaked intelligence information before it is released to the public. This eBook also examines WikiLeaks use of cryptocurrencies like Bitcoin, the Surface, Deep and Dark Web, exploit Linked In to create IC Watch, its connection with the Tor Project, PRG, OVH, and the Freedom of the Press Foundation along with the Wau Holland Foundation. And just how did WikiLeaks aid and abet Edward Snowden's flight to Moscow in search of political asylum? Finally, this new eBook will examine the role Russia played in providing classified information to WikiLeaks and its impact on the 2016 US Presidential Election. Order your copy today on the Kindle Store: https://www.amazon.com/dp/B07819MTDH  Lawrence, Cyber Security Defender

North Korea - Brinkmanship or On the Brink? (live on the Kindle Store)

North Korea has been led by the Kim dynasty since the 1953 United Nations Armistice Agreement was signed ending the Korean conflict. Each successive leader of the Kim family has continued the DPRK's pursuit of WMD, nuclear weapons in particular, while increasing its hostility toward the United States and South Korea. With little intervention by China, North Korea led by Kim Jong-un and the United States President Trump appear on a collision course of military conflict. This eBook provides readers with a concise understanding of this conflict and likely repercussions. Topics include: The Korean Peninsula (Pre-1950), The Korean Conflict (1950-1953), The Armistice Agreement, North Korea’s Leaders, The Axis of Evil, The Statistical Backdrop, WMD in East Asia, China – The Elephant in the Room, US, South Korea and Japan, Scenario 1 –US Places Nukes in South Korea, Scenario 2 - US preemptive Military Strike, Scenario 3 - US Decapitates North Korea’s Leadership, Scenario 4 – US Massive Covert and Cyber Warfare, Conclusions and an Appendix with North Korean Military Installations. A must read for anyone concerned about national security and the stability of East Asia. Order your copy today at the Kindle Storehttps://www.amazon.com/dp/B071R3439G Lawrence, Cyber Security Defender