Saturday, May 25, 2019

Cisco CCNA Routing & Switching: One of the highest demand IT certifications (200-125) - The Complete Course

Colleagues, CCNA Certification Training from Master of Project Academy is designed to ensure that you clear the CCNA 200-125 exam in the first attempt. This hands-on training approach, entrusted by 50,000+ learners, will help you to imbibe the workings of the CCNA 200-125 Certification Exam Content as prescribed by Cisco®. We guarantee that you will walk away with all the preparation and confidence you need to conquer the CCNA certification exam and earn the CCNA 200-125 certification in your first attempt. Key skills you will gain include Introduction to TCP/IP Networking, OSI Model, a look at the Cisco Models, Introduction to Ethernet LANs, Nodes used on Ethernet LANs, IPv4 Addressing, Class-Full Subnetting IPV4, VLSM, Route Summarization, Configuration within the CLI, Routing and the EIGRP Routing Protocol, Route Summarization, OSPF, Switching, VLANs, Inter-VLAN Routing and EtherChannel, IPv6 and much more. Register today at https://tinyurl.com/y3pl9akp Much career success, Lawrence Wilson (https://onlinelearningcentral.blogspot.com/)

Security, Risk & Compliance Professionals: Certified Information Systems Auditor (CISA) – Your passport to new career and income opportunities

Colleagues, this Certified Information Systems Auditor (CISA) certification course will give you the skillsets to govern and control enterprise IT and perform an effective security audit on any organization. You’ll gain expertise in the acquisition, development, testing, and implementation of information systems and learn the guidelines, standards and best practices of protecting them. CISA is one of the hottest areas in information security, with a need for six million IT security professionals by 2019. You will gain ne skills which will equip you to pass the CISA certification exam which are also in high demand in the IT field, including Process of Auditing Information Systems, IT Governance and Management, Information Systems Acquisition, Development and Implementation, Information Systems Operations, Maintenance and Service Management, and Protection of Information Assets. Register today at https://tinyurl.com/y3kh6uy4 Much career success, Lawrence Wilson – Online Learning Center

Wednesday, December 5, 2018

Does the G20 have the political will to enforce cryptocurrency money laundering and anti-terrorism measures?

Colleagues, following the conclusion of last week’s G20 meeting in Argentina the non-binding governmental body issued a position paper entitled “Building Consensus for Fair and Sustainable Development.” Chief among its statements was the position that “We will regulate crypto-assets for anti-money laundering and countering the financing of terrorism in line with FATF standards and we will consider other responses as needed.” FATF, the Financial Action Task Force, defined a number of areas of focus, including strengthening the institutional basis, governance and capacity of FATF, FATF's work on virtual assets, countering the financing of terrorism, and countering the financing of proliferation of weapons of mass destruction.  The bottom line: Despite the written statements referenced above, we raise serious doubts that the G20 - especially Russia, China and Saudi Arabia – lacks the political will to implement the intent of this decree. Rather, we see an a la cart approach to enforcing FATF policies “if and when” they are advantageous to each nation. Share a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)

Wednesday, November 28, 2018

How secure are cryptocurrency software wallets against cyber criminals injecting malicious code?

Colleagues, the on-going debate regarding which type of crypto wallet is more secure continues with no clear consensus – hardware, software, clod-based and paper wallets. This debate has returned to the spotlight given the recent security breach of BitPay’s Copay (software) Wallet. Copay claims its mobile The Copay app securely stores multiple, distinct bitcoin wallets, allowing both business and privacy-conscious users to keep funds carefully separated. GitHub issued a memo to users reporting an  ‘event-stream` dependency attack steals wallets from users of copay. For details take a look at the YCombinator news feed on this attack. The bottom line: For individual digital asset traders software wallets are immensely more convenient than hardware and paper wallets, however, they are far more prone to cyber-attacks – quantum password processing, malware and adware … just to name a few. If you do use a software wallet we highly recommend using any and all security features at both the application and OS levels. The Copay breach reminds us that the cryptocurrencies are no more secure than the weakest link in the crypto ecosystem. Share a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)

Friday, November 16, 2018

Will the enforcement of economic sanctions force crypto exchanges to purge Iranian traders?

Colleagues, Bittrex, BitMex and now Binance have banned Iranian cryptocurrency traders in an effort to avoid penalties in the wake of US economic sanctions. The exchanges issue a warning to users based in Iran to withdraw their funds or face the confiscation of their assets. There are surely legitimate crypto traders in the Persian state, however, the goal is to place an embargo on any state-sponsored entities from circumventing US trade sanctions. Binance has moved from China to Japan, while BitMex HQ is in Hong Kong and Bittrex is located in the US. Exchanges, whether with large or modest trading volumes, face penalties for aiding and abetting Iranian actors from participating – even on the margins – in the global economy. Will other crypto exchanges follow their lead? We believe the strategies of other crypto platforms will depend on the rigor of direct or indirect US penalties. Post a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)

Thursday, November 15, 2018

Cryptocurrency Triple Play - How common are pyramid schemes similar to those in China, South Korea and Japan?

Colleagues, East Asia has become a hotbed for multi-level marketing schemes which exploit the allure of and poor transparency of cryptocurrencies, namely Bitcoin. Whether this past May in China ($47m) or more recently in South Korea ($20m) and Japan ($68m), crypto fraud schemes are running rampant across the region. Bottom line: Despite many efforts by credible members of the global crypto ecosystem, digital such as Bitcoin, Ethereum, Ripple and others, are wrought with the potential for scams and related cybercrimes. Government enforcement entities such as China’s Ministry of Public Security or the US SEC only have the bandwidth to track and prosecute a small minority of crypto fraud cases. We do not foresee a significant reduction in crypto cybercrimes until government agencies have both the cyber tools and manpower to launch a counter-offensive which is likely to be 2-3+ years in the future. Post a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)

Thursday, November 8, 2018

What is the impact of the malicious JavaScript code injection into StatCounter’s URI among cryptocurrency exchanges?

Colleagues, the world’s thirty-eight largest crypto exchange Gate.io was successfully hacked via the injection of code into StatCounter’s URI “myaccount/withdraw/BTC”. Reported by security firm ESET WeLiveSecurity indicated that although Gate.io is the only known crypto exchange effected, all of StatCounter’s some 2 million customer sites are at risk. For readers with a programming background the code was injected via the Dean Edwards JS packer in the middle of the script. We assume that economic gain is the chief motive although the ESET report did not provide corroborating details. This cyber-attack raises two questions. First, how susceptible are URIs (uniform resource identifiers) to injections via the Dean Edwards packer? And second, how many more web sites which use StatCounter – a competitor to Google Analytics – are effected? We will continue to research answers to both questions. Post a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/) 

Tuesday, October 30, 2018

Can Blockchain deliver security, performance and dependability for Japan’s new Payment Clearing Network?

Colleagues, Blockchain technology is about to meet once of its biggest challenges to date – the Japanese Banks' Payment Clearing Network consortium. The critical success factors include performance, security and dependability when processing of low-cost transfer of small-scale transactions using RTGS.for nine commercial banks. Fujitsu has been selected to develop the new Blockchain-based system. If this test proves successful, it will clearly distinguish Japan as a “first mover” when it comes to the industrial use of Blockchain technology among the world’s leading economies. One advantage here is the fact that all the players are Japanese owned and operated entities and may benefit from both technological and well as cultural synergies. China, South Korea and the US will closely monitor this stress test as they seek to implement comparable systems. Share a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/) 

Monday, October 29, 2018

Does Blockchain’s DLT hold the key to Central Bank Digital Currency Adoption?

Colleagues, we have written extensively on the propensity of central sovereign banks to issue their own cryptocurrencies. The US Federal Reserve and the PBoC appear to be on opposite ends of the adoption continuum. New research published by the OMFIF (Official Monetary and Financial Institutions Forum) and IBM point us to the Occam’s razor of CBCD adoption: Distributed Ledger Technology (DLT). Download the CBDC report here. Private sector ICOs continue to rise with no end in sight. While they understand that their underlying Blockchain technology likely has bugs and security vulnerabilities, financial institutions in particular – such as JP Morgan, Fidelity, BlackRock, etc. – clearly see the benefits of trans-border remittances, increased transaction speed and lower OPEX. In aggregate central bankers have major reservations on the security and dependability of DLT. The report states that the goal is to “construct a convincing RTGS replacement that can be properly benchmarked against existing systems and meet the high standards for security, robustness, efficiency and speed.” The PBOC is hiring staff to develop its CBDC as we speak, whereas the US Fed is cautiously assessing its options. Many other central banks are somewhere in between. Our prediction: By 2023, most G20 nations will have launched their own CBDC. Post a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/) 

Friday, October 26, 2018

Security Lies in the Balance as Blockchain’s LockBox Wallet Uses the SWAP Crypto-to-Crypto Brokerage

Colleagues, does the global cryptosphere truly need another hardware wallet? The CEO of Blockchain clearly believes the answer is yes, indeed. The firm has announced plans to begin shipping its new LockBox device this November. LockBox’s distinguishing features is that it enables the exchange between different cryptocurrencies in partnership with SWAP brokerage. The value proposition is that traders can exchange Bitcoin for Ethereum, XRP for LiteCoin, Ripple for Ether … you get the idea. Two key factors will determine the success of LockBox. First is the Total Addressable Market from “crypto-to-crypto” transfers. With a global market cap of some $209B we anticipate that roughly 10% of crypto traders will need to make such a transfer during their financial careers. Second is the infamous security challenge – how secure is the hardware wallet when connected to the Internet as well as the security of LockBox’s interface with the SWAP brokerage when making transactions. Our recommendation: Proceed with caution. Post a comment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)