Satoshi Nakamoto Blog

Category : cyber security

adware Android antivirus Android Malware Android security android virus cyber security Google Play Protect Google Play Store Mobile Security

Google Bans 600 Android Apps from Play Store for Serving Disruptive Ads

Google has banned nearly 600 Android apps from the Play Store for bombarding users with disruptive ads and violating its advertising guidelines. The company categorizes...
cyber security email phishing Phishing Scam Russian hackers

You’ve Been Selected for ‘Like of the Year 2020’ Cash Prizes

Cybersecurity researchers have discovered a large-scale ongoing fraud scheme that lures unsuspecting Russian Internet users with promises of financial rewards to steal their payment card...
cyber espionage cyber security Hacking News Iranian computers Iranian Hackers Malware attack secure vpn server VPN hacking VPN Vulnerability

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

A new report published by cybersecurity researchers has unveiled evidence of Iranian state-sponsored hackers targeting dozens of companies and organizations in Israel and around the...
bluetooth hack Bluetooth hacking cyber security hacking bluetooth devices Vulnerability

A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices

A team of cybersecurity researchers late last week disclosed the existence of 12 potentially severe security vulnerabilities, collectively named ‘SweynTooth,’ affecting millions of Bluetooth-enabled wireless...
cyber security Digital Currencies Federal Reserve Jerome Powell libor Libra Mike Crapo Regulatory guidance Regulatory reform Regulatory relief

Fed’s Powell open to more than one Libor alternative

WASHINGTON — Federal Reserve Chairman Jerome Powell told senators Wednesday that his agency is open to exploring a separate alternative reference rate that would be...
Chinese Hackers cyber security data breach Equifax Equifax Data Breach

U.S. Charges 4 Chinese Military Hackers Over Equifax Data Breach

The United States Department of Justice today announced charges against 4 Chinese military hackers who were allegedly behind the Equifax data breach that exposed the...
Bug Bounty Bug Bounty Program cyber security Vulnerability vulnerability assessment Vulnerability Database vulnerability disclosure vulnerability reporting

The Rise of the Open Bug Bounty Project

Can you imagine launching a global bug bounty platform with almost 500,000 submissions and 13,000 researchers without consuming a cent from venture capitalists? If not,...
Azure cloud Cloud Computing cloud security cloud server cyber security Microsoft Microsoft Azure remote code execution server security Vulnerability

Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers

Cybersecurity researchers at Check Point today disclosed details of two recently patched potentially dangerous vulnerabilities in Microsoft Azure services that, if exploited, could have allowed...
cyber security Cynet Enterprise Security Managed Security Service Provider security operations center software security

Cynet Empowers IT Resellers and Service Providers to Become Fully Qualified MSSPs

As cyber incidents increase in scope and impact, more and more organizations come to realize that outsourcing their defenses is the best practice—significantly increasing the...
CacheOut cyber security intel CPU intel processor intel vulnerability MDS attacks speculative execution speculative execution vulnerability

New ‘CacheOut’ Attack Leaks Data from Intel CPUs, VMs and SGX Enclave

Another month, another speculative execution vulnerability found in Intel processors. If your computer is running any modern Intel CPU built before October 2018, it’s likely...