Friends, as we now know countless of Myetherwallet
users began to report suspicious activity on April 24, 2018 when trying to
access the web-based Ethereum interface. As the web’s most popular client-side Ethereum
wallet, MEW is widely used for buying Cryptokitties, sending money to
crowdsales and beyond. BGP (Border
Gateway Protocol) messages to the internet's core routers to convince them to
send traffic destined for some of AWS's servers to a renegade box in the US.
The rogue machine then acted as AWS's DNS service, and gave out the wrong IP
addresses for MyEtherWallet.com, pointing some unsuspecting visitors to the
dot-com at a phishing site that stole their money. Bottom line: Just how vulnerable
are today’s Cryptocurrency wallets to DNS and related cyber attacks? The April 24 event not only sent
shockwaves through the MEW community but also calls into question of the
integrity of the broader Cryptocurrency juggernaut. Send us your
comments today! Lawrence, Cyber
Security Defender (https://cybersecuritydefender.blogspot.com)
Our mission is to provide world-class cybersecurity Training and Certification programs to individuals and businesses globally.
Monday, April 30, 2018
Will Byzantine Fault Tolerance Enable Blockchain Adoption Beyond Cryptocurrencies?
Friends, Byzantine fault tolerance (BFT) is the resistance of a fault-tolerant computer system, especially distributed computing systems, towards electronic component failures where there is
imperfect information on whether a component is failed. In a "Byzantine
failure", a component such as a server can inconsistently appear both
functioning and failed to failure-detection systems, presenting different
expressions to different observers. Perhaps nowhere is BFT more
essential than on a Blockchain. Most traditional distributed computing
environments have central configuration databases or authorities that can help
right wrongs in the event that Byzantine failures occur. Blockchain applications, starting
with Bitcoin’s Proof-of-Work consensus method, are today proposing solutions to
this challenge. Can BFT and/or dBFT help solve this dilemma? Send us your
comments. Lawrence, Cryptocurrency
Academy (https://cryptocurrencyacademy.blogspot.com)
Sunday, April 29, 2018
Vladimir Putin-The World’s Most Dangerous Man (on the Kindle Store)
Vladimir Vladimirovich Putin – The World’s Most Dangerous Man is the latest ebook from Genesys Publishing. We will examine A Definition of Danger in the 21st Century, Candidates for the World's Most Dangerous Man, Putin's Pathology, Putin’s Motives and Goals, Putin’s Means and Measures, Putin’s Willingness and Propensities, Putin - A Foreshadow of the anti-Christ, Counter-Measures, Slaying the Red Bear, Conclusions along with Recommended Reading and Supplemental Resources. Our conclusion is based on our assessment that Putin has the Motives, Means and Willingness to undermine the very sovereignty of free and western democracies. The time to implement a powerful array of counter-measures is today in order to preserve our rights to life, liberty and the pursuit of happiness for years to come. Order your copy today on the Kindle Store (https://www.amazon.com/-/e/ B06Y3GLT8W). Lawrence, Cyber Security Defender
Putin's Kremlin-Epicenter of Global Cyber Warfare (on the Kindle Store)
Putin's Kremlin - Epicenter of
Global Cyber Warfare: This goal of this eBook is provide a wake-up call for the new
US government’s executive leadership, however well intentioned, yet seemingly
naïve, that Russian cyber warfare is a clear and present danger to national
security. Key topics include An Historical Primer on Russia' Leaders, Putin’s
Pathology, The Era of Cyber Warfare, Russia’s Deception, Russia’s Goals and
Methods, Russia’s Cyber Proxies, Russia’s Cyber Impact, Building the Great Wall
of Cyber Security, Slaying the Red Cyber Bear, Concluding Thoughts,
Supplemental Cyber Resources and Cyber Intelligence Feeds. The central premise of this codex is that Russia, as led by
President Vladimir Putin, has the motive, resources and
infrastructure to wage cyber war against free and democratic nations,
chiefly the United States, for the primary purpose of regaining its global
military dominance it had prior to the collapse of the former Soviet
Union. Order today on the Kindle Store: https://www.amazon.com/dp/B06XTYGJXF
WikiLeaks Exposed - Balancing Free Speech with National Security
WikiLeaks Exposed - In the era of WikiLeaks, Julian Assange, Edward Snowden and hardened cyber security, how do free and democratic nations balance the rights of their citizens with national security? WikiLeaks Exposed seeks to shed light on the motivations of its founder, funding sources, media partners, and the use of cyber technology to protect leaked intelligence information before it is released to the public. This eBook also examines WikiLeaks use of cryptocurrencies like Bitcoin, the Surface, Deep and Dark Web, exploit Linked In to create IC Watch, its connection with the Tor Project, PRG, OVH, and the Freedom of the Press Foundation along with the Wau Holland Foundation. And just how did WikiLeaks aid and abet Edward Snowden's flight to Moscow in search of political asylum? Finally, this new eBook will examine the role Russia played in providing classified information to WikiLeaks and its impact on the 2016 US Presidential Election. Order your copy today on the Kindle Store: https://www.amazon.com/dp/B07819MTDH Lawrence, Cyber Security Defender
North Korea - Brinkmanship or On the Brink? (live on the Kindle Store)
North
Korea has been led by the Kim dynasty since the 1953 United Nations Armistice
Agreement was signed ending the Korean conflict. Each successive leader of the
Kim family has continued the DPRK's pursuit of WMD, nuclear weapons in
particular, while increasing its hostility toward the United States and South
Korea. With little intervention by China, North Korea led by Kim Jong-un and
the United States President Trump appear on a collision course of military
conflict. This eBook provides readers with a concise understanding of this
conflict and likely repercussions. Topics include: The Korean Peninsula
(Pre-1950), The Korean Conflict (1950-1953), The Armistice Agreement, North
Korea’s Leaders, The Axis of Evil, The Statistical Backdrop, WMD in East Asia,
China – The Elephant in the Room, US, South Korea and Japan, Scenario 1 –US Places
Nukes in South Korea, Scenario 2 - US preemptive Military Strike, Scenario 3 -
US Decapitates North Korea’s Leadership, Scenario 4 – US Massive Covert and
Cyber Warfare, Conclusions and an Appendix with North Korean Military
Installations. A must read for anyone concerned about national security and the
stability of East Asia. Order your copy today at the Kindle Store: https://www.amazon.com/dp/B071R3439G Lawrence, Cyber Security Defender
Subscribe to:
Posts (Atom)