Security News
Due to the frequency, most of the public and news outlets focus on only the most damaging breaches containing the most sensitive personal identifying information, routinely ignoring the more common hacks that leak usernames and passwords for basic website accounts. While a number of different options have emerged, Ethereum co-founder Charles Hoskinson said in an interview that blockchain was the key to a passwordless future for the internet.
Sixgill, a leader in data automation and authenticity products and services, announced the release of Integrity 2.0, a powerful data authenticity solution that combines a practical permissioned blockchain with a public blockchain auditor in an industry-first "Hybrid-hybrid" implementation that achieves absolute data integrity and veracity. Integrity 2.0 makes blockchain data integrity easy and practical so organizations can quickly solve the rising need for end-to-end, real-time data authenticity assurance.
An IT startup has developed a novel blockchain-based approach for secure linking of databases, called ChainifyDB. "Our software resembles keyhole surgery. With a barely noticeable procedure we enhance existing database infrastructures with blockchain-based security features. Our software is seamlessly compatible with the most common database management systems, which drastically reduces the barrier to entry for secure digital transactions," explains Jens Dittrich, Professor of Computer Science at Saarland University at Saarbrücken, Germany. "If a doctor changes something in his table, it affects all other tables in the network. Subsequent changes to older table states are only possible if all doctors in the network agree," explains Jens Dittrich.
During the event's annual Cryptographer's Panel, industry leaders broke down their top crypto-concerns, including privacy regulations, election security and blockchain. "Any legislation that requires people to undo past actions is contrary to the technology. In most cases, blockchain is overhyped and there are simpler ways to achieve the same goal. Most of these use cases have been proposed for blockchain are nonsense."
"The makers of the blockchain voting platform Voatz have had to go on the offensive to address assertions from MIT researchers that their app is insecure and can be easily hacked into. MIT researchers released a lengthy paper on Thursday that said hackers could change votes through the app, which has already been used in Oregon, West Virginia, Washington, and Utah since 2018."Their security analysis of the application, called Voatz, pinpoints a number of weaknesses, including the opportunity for hackers to alter, stop, or expose how an individual user has voted," MIT said in a news release. Michael Specter, a graduate student in MIT's Department of Electrical Engineering and Computer Science and a member of MIT's Internet Policy Research Initiative, and James Koppel, also a graduate student in EECS, described what went wrong with Voatz and how they discovered the vulnerabilities in their paper, "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S Federal Elections."
In a conference call on Thursday, Voatz responded to MIT researchers' critique of its voting app. Voatz combines a smartphone app, biometric verification, and Hyperledger blockchain to make voting easy for people who can't physically make it to the ballot box.
It's not surprising that someone would eventually suggest blockchain could solve all of Wikipedia's security problems. As Krawisz said on Twitter, "It would be so cheap to record enough information about all Wikipedia interactions on the [Bitcoin] blockchain that you could probably eliminate all possible child porn distribution on it for very low fees. Think of the savings!".
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept or pilot stage, according to Gartner. "Today, supply chain leaders have now started to treat blockchain as part of a longer-term technology roadmap and risk management planning. We see that many leaders are adopting a broader end-to-end view across their supply chains and map all requirements - from sourcing across manufacturing to the final distribution," Mr. Stevens added.
CES 2020: A "Hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats. How the IoT devices work, basically the IoT solution is based on a very low-power CPU that is running the software, communicating through a gateway to the cloud and application.
CES 2020: A "Hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats. How the IoT devices work, basically the IoT solution is based on a very low-power CPU that is running the software, communicating through a gateway to the cloud and application.