A Brief History of Russian Hackers' Evolving False Flags

Most hackers know how to cover their tracks. But Russia’s elite groups are working at a whole other...

Read More

Microsoft's Secured-Core PC Feature Protects Critical Code

The “secured-core PC” feature for Windows looks to head off firmware hacks.

Read More
4 Cryptocurrency Projects That Successfully Changed Blockchains
Oct22

4 Cryptocurrency Projects That Successfully Changed Blockchains

Choosing the right blockchain is a tough call for any development team. It’s a decision that entails correctly anticipating project requirements – scalability; speed; community; security – before a line of code has even been written. It’s no wonder that a project occasionally finds its first choice of blockchain isn’t ‘the one,’ forcing it to play the field. Also read: Bitmain’s Jihan Wu...

Read More
Running Bitcoin Cash: An Introduction to Operating a Full Node
Oct22

Running Bitcoin Cash: An Introduction to Operating a Full Node

Setting up a Bitcoin Cash node is a fairly easy task for someone who wants to contribute to the decentralized ecosystem. There are various ways you can run a node whether it’s on a cloud, on a local machine or by leveraging a small single-board computer. The following is a simple introduction for anyone who wants to set up a full node implementation. Also Read: The Fed Plans to Inject $60 Billion per Month Into the Economy The...

Read More
Bad for Business: How KYC/AML Makes Everyone a ‘Terrorist’
Oct22

Bad for Business: How KYC/AML Makes Everyone a ‘Terrorist’

Two reports from risk solutions group Lexisnexis assert that anti-money laundering (AML) and know your customer (KYC) policies can negatively affect a business’s bottom line and customer service significantly. A recent trip to the local post office for a money order certainly had a negative effect on my own experience, thanks to the same regulations, which make paying customers feel like they are suspected terrorists just for...

Read More