Cyber Security

Posts about Cyber Security. Subscribe to my newsletter to make sure you don't miss anything.
Officials seized more than 94,000 bitcoin from Ilya Lichtenstein, 34, and his wife, Heather Morgan, 31, who are accused of conspiracy to launder, not of actually hacking 119,000 BTC from Hong Kong's Bitfinex exchange back in 2016. Continue Reading →
Meta announced "Personal Boundary" for Horizon Worlds and Horizon Venues, which "prevents avatars from coming within a set distance of each other, creating more personal space for people and making it easier to avoid unwanted interactions." Continue Reading →

Welcome to Metacademy

Metacademy
I’m thrilled to announce our new Web 3 training facility at Metacademy.xyz. Together with our partners, Blockchain Foundry and Catbotica, we’ve created a free-to-use, risk-free hands-on tutorial that will teach you the correct way to set up a crypto wallet, mint your own NFTs, learn how to buy and sell them, and much, much more. Continue Reading →
Is Norton Antivirus "sneakily" installing crypto mining software on your computer and skimming a commission? Yes… and no. If you install Norton Antivirus, you will see a file called NCrypt.exe, which is Norton's crypto mining software. So, yes, installing Norton Antivirus will install Norton's crypto mining software, but… it will not function in any way without your explicit permission, and only if you have the correct hardware configuration to mine crypto. Continue Reading →
Shelly Palmer Innovation Series Summit 2022
You can attend the “must attend” event during CES® 2022 whether you’re going to Las Vegas or working from home. The Shelly Palmer Innovation Series Summit will stream live on January 5, 2022 at 11 a.m. ET at shellypalmer.com/live. Continue Reading →
You've probably heard about the Log4j hack; it's the latest "big, scary, systemic" hack to threaten literally the entire internet. The size and scope of the vulnerability is so large that it may take years to fix. Why? Log4j is a ubiquitous utility program used to log security and performance information for all kinds of consumer and enterprise services, websites, applications, and countless tech products. The vulnerability allows attackers to execute code remotely on a target computer. Said differently, threat actors can easily steal data, install malware, or simply take control of a system. Continue Reading →

You’re Invited

It is my pleasure to invite you to the 2022 Shelly Palmer Innovation Series Summit, streaming on YouTube Live, Jan. 5 at 11 a.m. ET. Continue Reading →
Taking a giant step toward a safer crypto world, Coinbase announced that, starting with Ledger, it will begin to support hardware wallets. Sometimes called "cold wallets," experts agree that hardware wallets are the preferred way to store cryptocurrency and other blockchain-based digital assets. Continue Reading →

Get Briefed Every Day!

Subscribe to my daily newsletter featuring current events and the top stories in technology, media, and marketing.

Subscribe