Wondering about what a "51% attack" is? When the mining power for a decentralized blockchain network becomes too concentrated (centralized), miners with bad intentions can overturn blockchain transactions and double-spend participants' crypto. Continue Reading →
Cyber Security
Posts about Cyber Security.
Subscribe to my newsletter to make sure you don't miss anything.
Officials seized more than 94,000 bitcoin from Ilya Lichtenstein, 34, and his wife, Heather Morgan, 31, who are accused of conspiracy to launder, not of actually hacking 119,000 BTC from Hong Kong's Bitfinex exchange back in 2016. Continue Reading →
Meta announced "Personal Boundary" for Horizon Worlds and Horizon Venues, which "prevents avatars from coming within a set distance of each other, creating more personal space for people and making it easier to avoid unwanted interactions." Continue Reading →
I’m thrilled to announce our new Web 3 training facility at Metacademy.xyz. Together with our partners, Blockchain Foundry and Catbotica, we’ve created a free-to-use, risk-free hands-on tutorial that will teach you the correct way to set up a crypto wallet, mint your own NFTs, learn how to buy and sell them, and much, much more. Continue Reading →
Is Norton Antivirus "sneakily" installing crypto mining software on your computer and skimming a commission? Yes… and no. If you install Norton Antivirus, you will see a file called NCrypt.exe, which is Norton's crypto mining software. So, yes, installing Norton Antivirus will install Norton's crypto mining software, but… it will not function in any way without your explicit permission, and only if you have the correct hardware configuration to mine crypto. Continue Reading →
The Shelly Palmer Innovation Series Summit is an annual "must attend" event at CES. In the following presentations, an exceptional group of industry leaders offer specific actionable insights to help you drive growth and create value for your business. Continue Reading →
You can attend the “must attend” event during CES® 2022 whether you’re going to Las Vegas or working from home. The Shelly Palmer Innovation Series Summit will stream live on January 5, 2022 at 11 a.m. ET at shellypalmer.com/live. Continue Reading →
You've probably heard about the Log4j hack; it's the latest "big, scary, systemic" hack to threaten literally the entire internet. The size and scope of the vulnerability is so large that it may take years to fix. Why? Log4j is a ubiquitous utility program used to log security and performance information for all kinds of consumer and enterprise services, websites, applications, and countless tech products. The vulnerability allows attackers to execute code remotely on a target computer. Said differently, threat actors can easily steal data, install malware, or simply take control of a system. Continue Reading →
It is my pleasure to invite you to the 2022 Shelly Palmer Innovation Series Summit, streaming on YouTube Live, Jan. 5 at 11 a.m. ET. Continue Reading →
Taking a giant step toward a safer crypto world, Coinbase announced that, starting with Ledger, it will begin to support hardware wallets. Sometimes called "cold wallets," experts agree that hardware wallets are the preferred way to store cryptocurrency and other blockchain-based digital assets. Continue Reading →