News 

Prosecutors: Russian hackers exploit US cyber vulnerability

“From April to June 2016, the hackers installed updated versions of their software on at least 10 Democratic computers” writes The Associated Press for seattletimes.com. The indictment also shows the reliance of Russian government hackers on American technology companies such as Twitter, to spread its stolen documents.Meanwhile, around the same time, the hackers broke into 33 DNC computers and installed their software on their network. Source: seattletimes.com Share This:

Read More
News 

12 Russians indicted over hacking into Democrats’ computers

“Special Counsel Robert Mueller charged 12 Russian military intelligence agents on Friday with hacking into the computers of Hillary Clinton and the Democratic Party ahead of the 2016 election” writes D C for marketwatch.com. The federal grand-jury indictment comes just ahead of President Donald Trump’s meeting with Russian President Vladimir Putin on Monday.Russia has been accused in past Mueller indictments of seeking Trump’s election, and Trump said on Friday that he would bring up the issue of “meddling” with the Russian president.They used a network of computers across the world…

Read More
Crypto News 

Introducing a16z crypto

“Today we are announcing the launch of a16z crypto, a $300M venture fund that will invest in crypto companies and protocols” writes Chris Dixon for a16zcrypto.com. Many crypto applications still get dismissed as toys.Although the Bitcoin whitepaper is now almost 10 years old, we believe we are still early in the crypto movement.If you are an entrepreneur working on a crypto project, we’d love to talk to you — please send us a note.Blockchain computers are new types of computers where the unique capability is trust between users, developers, and…

Read More
Crypto News 

Chinese Police Confiscate 200 Computers Used to…

“Chinese police have seized more than 200 computers used to mine cryptocurrencies after a man was alleged to have attempted to cheat the electricity company with unpaid bills” writes Rebecca Campbell for livebitcoinnews.com. Yet, as it does, more people are turning their attention to mining cryptocurrencies.The suspect was using the computers to mine for cryptocurrencies such as Bitcoin and Ethereum.In April, Chinese police seized 600 Bitcoin mining machines following reports of irregular electricity use.Ma, who purchased the computers in April, was hoping to make some money through this operation. Source: livebitcoinnews.com…

Read More
News 

appeared to be driven by national espionage goals, such as the interception of military and civilian communications

“FireEye Inc in March said that a group it called Temp.Periscope reappeared last summer and went after defense companies and shippers” writes Joseph Menn for reuters.com. Symantec provides the most widely used paid security software for consumers and an array of higher-end software and services for companies and public agencies.Symantec said it has already shared technical information about the hack with the U.S. Federal Bureau of Investigation and Department of Homeland Security, along with public defense agencies in Asia and other security companies.SAN FRANCISCO (Reuters) – A sophisticated hacking campaign…

Read More
News 

Symantec: a hacking campaign launched from China, with the likely intention of espionage, breached satellite and defense companies in the US and Southeast Asia

“FireEye Inc in March said that a group it called Temp.Periscope reappeared last summer and went after defense companies and shippers” writes Joseph Menn for reuters.com. Symantec provides the most widely used paid security software for consumers and an array of higher-end software and services for companies and public agencies.Symantec said it has already shared technical information about the hack with the U.S. Federal Bureau of Investigation and Department of Homeland Security, along with public defense agencies in Asia and other security companies.SAN FRANCISCO (Reuters) – A sophisticated hacking campaign…

Read More
News 

How to see exactly which Google Chrome tabs, websites, and extensions are slowing down your computer

“Chrome extensions can also hog your CPU. You can stop an extension the same way you can stop a Chrome tab” writes Antonio Villas-boas for businessinsider.sg. But it’s also a good idea to go through your Chrome extensions and disable or remove those you don’t use by heading to the Chrome settings > More Tools > Extensions. Source: businessinsider.sg Share This:

Read More
GBP News 

British hacker who stopped WannaCry virus accused of lying to FBI

“The British security researcher who stopped the spread of last year’s NHS cyber attack has been accused of lying to US security services in new charges” writes Matthew Field for telegraph.co.uk. Marcus Hutchins, 24, was hailed as an unlikely hero for stopping the WannaCry cyber attack in 2017 which crippled computers around the world.He was arrested in Las Vegas in August last year accused of manufacturing a computer virus used to attack banks. The charges also allege Hutchins created another computer virus, called UPAS Kit, which was sold and later used…

Read More