Australian police in Queensland are pursuing a criminal investigation into what may be one of the first instances of a company swiping cryptocurrency using a software backdoor after a business deal went bad.
The alluring promise of gold inspired almost half-a-million to risk it all and rush to California in the mid-20th century in hopes of striking it rich. Although gold mining was fruitless for the most part, cunning opportunists profited off of desperate '49ers by selling synthetic gold or mines of no real value. A...
Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.
Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort.
A remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a large scale for mining the virtual currency monero, a researcher says. At least 400 websites have been infected, and the total number is likely far higher, security experts warn.
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud?
This session describes:
More about blockchain and its uses beyond digital currencies;
The value of...
How might blockchain improve digital identity proofing in the healthcare sector? The National Health Information Sharing and Analysis Center and security vendor Trusted Key are testing that out with a proof-of-concept application.
Cryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew Hickey and Jennifer Arcuri outline its potential.
Blockchain is high on the hype meter in 2018, but Gartner's Avivah Litan is encouraged by practical applications of the technology to secure financial transactions, protect identity and help organizations fight fraud.
GDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place April 16-20 in San Francisco.
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud?
This session describes:
More about blockchain and its uses beyond digital currencies;
The value of...
After a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity system that's designed to put users in control of their personal information.
Financial fraud can be notoriously hard to detect and easy to cover up. But is blockchain technology, with its distributed digital ledger, a new tool to help organizations reduce risk and prevent fraud?
This sessions describes:
Blockchain and its uses beyond digital currencies;
The value of blockchain to reduce...
Although developed as a core technology underlying the infamous bitcoin, the blockchain ledger mechanism is proving to have a multitude of potential use-cases, from IoT micropayments to capital market trading, retail banking and even voting. The bitcoin blockchain is, in effect, a distributed ledger, shared with...
Although developed as a core technology underlying the infamous bitcoin, the blockchain ledger mechanism is proving to have a multitude of potential use cases, from IoT micropayments to capital market trading, retail banking and even voting. The bitcoin blockchain is, in effect, a distributed ledger, shared with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.