Satoshi Nakamoto Blog

Tag : Cybersecurity

Cyber attacks cyber command cyber warfare cybersecurity Donald Trump energy Russia Russian election interference Technology us cyber command US military Vladimir Putin war

The US Has Allegedly Placed Malware Deep in Russia’s Power Grid

satoshi
Smoke from a power plant in Moscow, 2009.Photo: Mikhail Metzel (AP) The U.S. has deployed “American computer code” into Russian systems operating the nation’s power
Browser Extensions Chrome chrome extension Cross site scripting cyber security Universal XSS Web Application Security Web Application Vulnerability WEBSITE HACKING

Critical Flaw Reported in Popular Evernote Extension for Chrome Users

satoshi
Cybersecurity researchers discover a critical flaw in the popular Evernote Chrome extension that could have allowed hackers to hijack your browser and steal sensitive information
China DDoS Attack digital protest encrypted messaging apps Hong Kong secure messaging app surveillance Telegram Telegram Messenger

Telegram Suffers ‘Powerful DDoS Attack’ From China During Hong Kong Protests

satoshi
Telegram, one of the most popular encrypted messaging app, briefly went offline yesterday for hundreds of thousands of users worldwide after a powerful distributed denial-of-service
cybersecurity Facebook Federal Trade Commission FTC Mark Zuckerberg Privacy Security Social Media Technology

Facebook Worried About Mark Zuckerberg’s Old Emails in FTC Privacy Probe

satoshi
Photo: Francois Mori (AP) Employees within Facebook have dug up “emails that appear to connect Chief Executive Mark Zuckerberg to potentially problematic privacy practices” in
Cynet digital forensics tools Enterprise Security network security companies network security software Patch Management Software Penetration Testing software security vulnerability assessment

Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

satoshi
Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with—from conventional asset inventory
Breach and attack simulation. BAS solutions Cyber Attack cyber security data breach Endpoint Security Enterprise Security malware protection software

When Time is of the Essence – Testing Controls Against the Latest Threats Faster

satoshi
A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you’re protected right now. What do you do? Traditionally,
DRAM Chip DRAM Vulnerability Hacking News memory bit flipping RAM hacking RAMBleed RowHammer Attack Vulnerability

RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory

satoshi
A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access memory (DRAM) that could allow malicious programs installed on
cyber security Microsoft Microsoft Patch Tuesday windows updates windows Vulnerability

Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities

satoshi
After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows