Category: Security

Backpage Censored by Government, Forced to Shut Down Adult Section

Leading classified advertising website Backpage was forced to shut down its adult section last week, after it fell victim to a government inspection and crackdown. The US Senate committee, which released a full report on the matter, came to a consensus that the company was promoting and facilitating prostitution and child sex trafficking. Senators Rob Portman and Claire McCaskill stated that the decision of Backpage to terminate its adult section …
[Read More]

Bitcoin Legal in Netherlands, Prosecutors Speed Up Laundering Investigations

The legality of Bitcoin is clearly defined by several regulatory frameworks established by the Dutch lawmakers. However, local prosecutors and law enforcement agencies are leading various cases involving money laundering and the usage of bitcoin, to ensure that the digital currency is not utilized in any criminal activities. Similar to other law enforcement agencies including Interpol, the Dutch public prosecution department and police are allocating a significant amount of resources and capital to …
[Read More]

Top 5 Cryptocurrencies That Promote Anonymity

Throughout the past few years, bitcoin has pillared a revolutionary financial concept of decentralization that relies on utilization of a peer-to-peer network to confirm transactions between trustless parties. However a feature, and to some flaw in bitcoin’s blockchain is a public ledger that stores every single transaction, allowing the records to be visible by anyone. Even though your bitcoin address is a form of a “pseudonym”, this doesn’t provide total anonymity. …
[Read More]

Microsoft Aims to fill the IoT Security Gap

Friday’s big cyber-attack that knocked out sites like Amazon, Netflix, GitHub, and Spotify has prompted many companies to go on the offensive–Microsoft being one of them. As the investigation furthers, the hackers haven’t been found out yet, but the software they used to complete their mission was a Mirai like program.  The hackers used it to storm every unsecured IoT device they could come across, including security cameras and computers …
[Read More]