Page 1,050«..1020..1,0491,0501,0511,052..1,0601,070..»

The Memecoin Grift and How It Threatens Ethereum Culture – Yahoo Finance

The ceaseless and cynical pumping of tokens devoid of value is an existential threat to Ethereums reputation.

This memecoin culture is populated by the most chronically clout-addled people in the crypto industry, who exist in the Influencer Pit of Despair. This is a deep, dark hole where grifter influencers clamber over one another to rob the nearest retail tourist. You can locate the Influencer Pit in the form of a Twitter Space. But not just any Twitter Space. More like Twitter Spaces experienced as a debilitating K-Hole in a Prague dive-bar. And youve lost your wallet.

Its a fundamental paradox that since anyone can use the Ethereum blockchain, anyone can use the Ethereum blockchain. If Ethereum were a local park, the memecoiners would be an unruly gang of teenagers listening to music on some god-forsaken Bluetooth speakers.

Paul Dylan-Ennis is a CoinDesk columnist and lecturer in the College of Business, University College Dublin.

Imagine youre working on Eigenlayer or zero-knowledge (ZK) proofs or youre an Arbitrum delegate. And while youre valiantly working away on something useful you cant help but grit your teeth to hear some braindead dolt just made a cool million by tweeting.

Memecoins will always be part of an open source network like Ethereum, but for cryptocurrency to be widely adopted the industry needs to find a way to collectively address its worst forms of valueless profit seeking.

There is something hopeless about how little is offered by the memecoin grift.

When pepe (PEPE) was created the team outright admitted that the project was pure memeology, propelled along by our favorite rehabilitated frog. There is, at this stage in the industrys cycle, something quite empty about returning to the meme well, eking out a living as bottom feeders on some anon teams larp. Its mindless algorithmic churn, like we invented the wheel but only used it to go in circles.

And those Spaces! My word. Memecoin Spaces seem to be required by law to have the most obnoxiously loud host, for no apparent reason. At least three of the speakers, sporting equally terrible NFT (non-fungible token) investments as their PFPs (profile pictures), will admit to several misdemeanors over the course of an hour. At least 75% of the audience has bought something from Supreme and made a loss on it.

Story continues

Before you feel bad, lets remember what the Influencer Pit does. It sucks in retail investors, selling them on the concept that financial nihilism is the truth. It contributes to the idea that blockchain (or crypto or Web3) is merely about speculation. It stipulates your only option in life is to hustle fast enough and hope you dont end up as fodder for a CoffeeZilla video.

The latest trend is painfully banal. Its such a low-brow grift Im embarrassed to even write about it. Influencer grifters, often double-dipping from prior shilling of memecoins, will simply post an Ethereum address and ask people to send ether (ETH) to it. One can only hope the IRS does not ENS. The wink and nod in this scam is the explicit promise of no return. You would, and I mean this quite literally, be just as well setting fire to your physical wallet than sending a transaction like this.

In Ethereum there are no police. In a decentralized, permissionless culture there is nobody who can sanction you like the law might IRL

Im not sure what the appropriate punishment should be for these crimes against humanity. First-time offenders might have to attend Bitcoin Miami wearing an Ethereum T-shirt. Serial offenders will need harsher punishments, perhaps trapped in a dark room with a Richard Heart monologue on repeat, for up to two years. We might instead decide to capture all the grifter influencers on an island somewhere. Perhaps we could create a fake conference, NFT Pitcairn Islands, and then create a decentralized autonomous organization (DAO) whose only purpose is to ensure no flight ever leaves, spending treasury funds on bribing the islanders to distract the influencers with shiny objects.

There is a real problem here. Influencer grifters tell us upfront "you will get nothing" and you will be happy. But underlying is a much darker message: We can do nothing. This is the paradox of permissionlessness intrinsic to blockchain communities. Permissionlessness is a red line, non-negotiable topic in Ethereum culture. Without wishing to get all esoteric, if you lost the property of permissionlessness you wouldnt have Ethereum at all.

With technical solutions verboten this leaves us only with social options. Imagine Ethereum as a cosmopolitan city. It has its Municipal Hall of developers, organizers and researchers. It has its finance district with decentralized finance (DeFi). It has its bohemian quarter of NFTs. It has its Average Joes living on Main Street. But it also has its shady downtown where the grifters live.

Downtown is not as bad as Skid Row where youll probably find people plotting to social engineer Bored Ape owners. Like any city you can silo yourself in the safe areas and hope the police might deal with it. Except in Ethereum there are no police. In a decentralized, permissionless culture there is nobody who can sanction you like the law might IRL (of course governments can outside Ethereum).

This means you have to create an atmosphere, a cultural context, where the message of long-term regen culture overshadows short-term degen culture, relegating it to an immature phase. The regens are those within Ethereum culture dedicated to ensuring the technology does not generate negative externalities, but instead positively impacts society over the long term. How do we, in the words of Gitcoin founder Kevin Owocki, funnel more Ethereans into regen than degen?

Here I advocate for something a little unorthodox. I believe Ethereum should introduce a Citizens Assembly. In my home country of Ireland, citizens are randomly selected to convene and discuss important issues relating to the Irish Constitution. In Ethereum, we dont have a Constitution but there could be value in an annual forum where various stakeholders in Ethereum meet to discuss important concerns.

See also: Paul Dylan-Ennis Who Is Building Ethereum's Public Goods? | Opinion

Similar to the open-source concept that many eyes can fix a problem quicker than a single pair can, the Ethereum Assembly could consider pressing issues (e.g. what to do about Lido, a decentralized service that is said to be dominating Ethereum staking) but also how to encourage people away from degen into regen with active efforts. Citizens from each stakeholder group, from validators to developers to application builders to Average Joes could come together and hash it out.

And the most important effect? I believe it would encourage a sense of responsibility over the protocol across the community spectrum, introducing social matters as important as technical ones.

Or we could just keep sending the grifters ETH

Here is the original post:

The Memecoin Grift and How It Threatens Ethereum Culture - Yahoo Finance

Read More..

VirnetX and Envoy Sign Agreement – PR Newswire

Data Security Company to Sell VirnetX Matrix

ZEPHYR COVE, Nev., June 9, 2023 /PRNewswire/ --VirnetX Holding Corporation(NYSE: VHC) ("VirnetX") today announced that it has signed a non-exclusive agreement with Envoy Data Corporation to sell VirnetX's family of products, including VirnetX Matrix, to their 500 small-to-medium-size business customers in Healthcare, Manufacturing, Banking and Agriculture. They will also sell VirnetX Matrixto their 400+ existing channel partners ranging from System Integrators, VARS, MSPs and MSSPs.

"We are extremely pleased to have Envoy selling our products," said Kendall Larsen, VirnetX CEO and President. "Envoy is a leader in data security, expanding across the Country, delivering premier cybersecurity solutions to their impressive clientele."

"VirnetX Matrix is a great addition to our cybersecurity product arsenal," said Jeff Ciraulo, Envoy Data Principle and VP of Product Management Security Division. "VirnetX Matrix will bolster our Networking Security solutions as well as help customers strengthen their critical security needs across their business."

"Our staff said that our previous VPN solution was cumbersome and limited their ability to work," said Glen Davis, Envoy Data Chief Operating Officer. "The flexibility, capability and ease of use and management is exactly what we knew we could achieve with VirnetX Matrix.The difference was immediate once our remote users used VirnetX Matrix.We see what our customers will appreciate."

About VirnetX

VirnetX Holding Corporationis an Internet security software and technology company with patented technology for Zero Trust Network Access ("ZTNA") based secure network communications.VirnetX'ssoftware and technology solutions, including its Secure Domain Name Registry and Technology, VirnetX One, VirnetX War Room, VirnetX Matrix, and Gabriel Connection Technology, are designed to be device and location independent, and enable a secure real-time communication environment for all types of enterprise applications, services, and critical infrastructures. The Company's patent portfolio includes over 200 U.S. and foreign granted patents, validations, and pending applications. For more information, please visitwww.virnetx.com

About Envoy Data Security

Envoy Data Security is the first choice for protecting small-to-medium-size businesses and the public sector by effectively delivering comprehensive, best-in-class cybersecurity solutions that mitigate costly threats. Customers trust Envoy Data Security because of our people, our relationships, and the ease of doing business. For more information, please visit https://envoydata.com/

Special Note Regarding Forward-Looking Statements

This press release should be read in conjunction with our filings with the Securities and Exchange Commission. Statements herein may constitute "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended (the "Securities Act"), and Section 21E of the Securities Exchange Act of 1934, as amended (the "Exchange Act").

These forward-looking statements are based upon our current expectations, estimates, assumptions, and beliefs concerning future events and conditions and may discuss, among other things, expectations regarding the product and its impact on security solutions. Any statement that is not historical in nature is a forward-looking statement and may be identified by the use of words and phrases such as "anticipates," "believes," "estimates," "expects," "intends," "plans," "predicts," "projects," "will be," "will continue," "will likely result in," and similar expressions. Readers are cautioned not to place undue reliance on forward-looking statements. Forward-looking statements are necessarily subject to risks, uncertainties, and other factors, many of which are outside our control, and could cause actual results to differ materially from such statements and from our historical results and experience. These risks, uncertainties and other factors include, but are not limited to risks detailed in our filings with the Securities and Exchange Commission (the "SEC"). Readers are cautioned that it is not possible to predict or identify all the risks, uncertainties and other factors that may affect future results and that the risks described herein should not be considered a complete list. Any forward-looking statement speaks only as of the date on which such statement is made.

EXCEPT AS REQUIRED BY LAW, WE UNDERTAKE NO OBLIGATION TO UPDATE OR REVISE ANY FORWARD-LOOKING STATEMENT AS A RESULT OF NEW INFORMATION, FUTURE EVENTS OR OTHERWISE.

Investor RelationsVirnetX Holding Corporation415.505.0456[emailprotected]

SOURCE VirnetX Holding Corporation

Link:
VirnetX and Envoy Sign Agreement - PR Newswire

Read More..

Zscaler Inc’s Price Target Increased by Piper Sandler Analysts … – Best Stocks

Zscaler Inc, a leading cloud-based internet security platform provider, saw its price objective increase from $130.00 to $145.00 by Piper Sandler analysts in their latest research note issued last Friday. However, Piper Sandlers price target also indicates a potential downside of 2.57% from the companys current price.

The latest earnings data for Zscaler was released on Thursday, June 1st, which reported an EPS of $0.48 per share for the quarter beating consensus estimates of $0.42 by $0.06 and generating revenue of $418.80 million compared to expectations of $411.55 million.

Despite facing tough competition in the cloud-based security industry, Zscaler continues to innovate and diversify its offerings that include; Zero Trust Exchange, Zscaler Client Connector, Zscaler Internet Access, Zscaler Private Access, Zscaler B2B, Zscaler Cloud Protection and Zscaler Digital Experience.

It is no secret that cyber threats have increased exponentially during the pandemic as businesses transitioned to remote work- it is therefore commendable for any company within the cloud-based security industry who has managed to succeed in these unprecedented times.

In conclusion, while there may be some challenges ahead for Zscaler given its current market valuation and position alongside stronger competitors like CyberArk Software (NASDAQ: CYBR) and Palo Alto Networks (NYSE:PANW), the companys ability to adapt in todays fast-paced digital transformation landscape should not be understated with sell-side analysts predicting expected gains or even holding steady depending on adjustments made over this years trading period.

Current $150.84

Concensus $232.83

Low $125.00

Median $210.00

High $415.00

Social SentimentsWe did not find social sentiment data for this stock

Zscaler, Inc is a prominent cloud-based internet security platform provider. Recently, the NASDAQ-listed stock opened at $148.82. Its 50-day moving average is $113.69, while its 200-day moving average stands at $118.19. Despite this growth, the firm has witnessed a market capitalization of $21.60 billion with PE ratio of -78.74 and a beta of 0.84, being recently labeled as Moderate Buy. The companys leading product portfolio includes Zero Trust Exchange, Zscaler Client Connector, Zscaler Internet Access, Zscaler Private Access, Zscaler B2B, Zscaler Cloud Protection and Zscaler Digital Experience.

The stock has attracted significantly high ratings from several equities analysts who are keen on the growth potential of the company. Needham & Company LLC and Loop Capital have reaffirmed their positive rating for Zsacaler by raising their price objectives to $210.00 and $135 respectively in an effort to capitalize on investors confidence in the companys future growth prospects.

Oppenheimer started coverage on Zscaler by giving it an outperform rating with a target price set at $180 per share along Rosenblatt Securities that assumed coverage of the stock at a buy rating with a price target set at $135.

In addition to good news from analysts about investment potential and positive trajectory for growth driven by investors confidence after buying shares into getting a piece ownership stake in such promising technology progress made possible through cloud computing evolution- insiders Robert Schlossman (the companys insider) sold 3,645 shares worth over US$389k while CFO Remo Canessa also sold 6,229 shares worth US$665k from which each made gains totaling millions since they both own lots more stock options than what would be required under SEC rules indicating lengthy management loyalty commitment toward growth as a primary goal. Several hedge funds and institutional investors, such as Vanguard Group Inc., Artisan Partners Limited Partnership, WestBridge Capital Management LLC, First Trust Advisors LP, and Champlain Investment Partners LLC have increased their position in the company.

To sum it up, Zscalers position in the cybersecurity industry has been strengthened by some of these recent developments. The firms stock remains an attractive option for investors who are keen on betting on a reliable long-term tech partner that promises to deliver value through cloud-based internet security solutions. With a 12-month high of $194.21 per share and several favourable ratings from equity analysts, Zscaler looks promising regarding future wealth accumulation opportunities for prospective long term investors.

See original here:
Zscaler Inc's Price Target Increased by Piper Sandler Analysts ... - Best Stocks

Read More..

IDC Chair Bilirakis Opening Statement on Strengthening American … – Energy and Commerce Committee

Washington, D.C. Subcommittee on Innovation, Data, and Commerce Chair Gus Bilirakis (R-FL) delivered opening remarks at todays Innovation, Data, and Commerce Subcommittee hearing titled Building Blockchains: Exploring Web3 and Other Applications for Distributed Ledger Technologies.

Excerpts and highlights below:

THE IMPORTANCE OF BLOCKCHAIN TECHNOLOGIES

Cryptocurrencies and certain financial aspects of blockchains have hijacked the publics attention when it comes to this emerging technology.

Todays hearing will highlight that blockchains are not just impacting Wall Street but are also changing Silicon Valley, and the internet as a whole.

It is essential that Congress accurately understand what it is regulating before it does so.

This is a complicated topic, which is why Im looking forward to the superb panel of experts educating us here today.

The core issue is about how data is organized, preserved, and protected, which is the jurisdiction of this subcommittee.

As I understand it, a blockchain is a linked list, or ledger, of transactions stored on a network of computers.

Blockchains are composed of building blocks of data chained together cryptographically.

We will walk through these technical components today and discuss what it means for blockchains to be decentralized, immutable, and open.

But to step back from these terms, what we are really discussing here is a new, foundational technology that can provide individuals and businesses new ways to access, record, and validate digital activity online.

BLOCKCHAINS PROVIDE NEW OPPORTUNITIES

Web 1.0, the original World Wide Web, lasted from roughly 1993 to 2004, and was characterized by dial up and AOL.

It was replaced by Web 2, which is the current internet we know well, and has been characterized by smartphones and Big Tech platforms.

Web3, which encompasses nonfungible tokens (NFTs) and other use cases, is the emerging internet built on top of blockchains and is characterized by increased user control, decentralization, and transparency.

Using these technologies, developers are building new decentralized social media, new messaging apps, new ways to stream music, and new privacy enhancing technologies just to name a few.

Blockchains are not a crypto casino.In fact, according to one report, despite crypto prices falling roughly $2 trilliona 70 percent declineblockchain developers have only declined 10 percent.

There are respected developers who arent trying to make a fast buck, but rather theyre building a new evolution of the internet.

But this technology goes beyond just Silicon Valley. Blockchains, Web3, and other distributed ledger technologies are just tools.

Like the internet, blockchains will impact many areas of our jurisdiction and can help address challenges with our current internet ecosystem, bolster supply chains, verify information, and increase efficiency for businesses.

THE FTC SHOULD LEAD AGAINST BAD ACTORS

However, we shouldnt treat this technology as a cure-all.

There are still technical challenges such as scaling, data availability, and cybersecurity. There are also human challenges such as fraudsters and compliance with law enforcement.

As with any new technology, scams do existin the blockchain ecosystem.

As this committee knows well, the number one federal regulator of scams and fraud is the Federal Trade Commission (FTC), and thats where we want its focus.

Instead of diverting resources to fight legal battles over possible competition theories, the FTC should focus on protecting Americans from fraudsters, as these bad actors migrate from older technologies to these new technologies.

Last Congress, my bill the RANSOMWARE Act was signed into law. This legislation requires the FTC to increase cooperation with foreign law enforcement and report on Ransomware and other cyber-security-related attacks.

When international hackers target Americans using blockchains, the FTC should take a lead role in ensuring they are made whole.

Blockchains present an incredible opportunity, but also come with unique challenges.

Regardless, the United States must lead on the international stage so our adversaries do not have an opportunity to set the rules of the road.

We must lead with our values for freedom, human rights, and human dignity.

I look forward to working with members on both sides of the aisle to ensure these technologies are anchored here in the U.S. and we are central to that discussion.

Read the rest here:
IDC Chair Bilirakis Opening Statement on Strengthening American ... - Energy and Commerce Committee

Read More..

Foodmasku Dishes Out Edible Masks on Ethereum – Decrypt

Some detractors of NFTs fixate on their ethereal, intangible nature. How can they be art, critics cry, if they're only digital, virtual, disconnected from reality?

It would be difficult to levy those claims against the works of Foodmasku.

Thats the moniker of Antonius Wiriadjaja, the multimedia performance artist whofor three years nowhas created NFTs depicting himself wearing masks made entirely of food, and then eating the masks. The ultimate consumption of the work is a rule, a key component.

The association between masks and foodand between food masks and the blockchain for that matteris not necessarily intuitive. That may be because, for Wiriadjaja, those connections were the product of organic necessity.

In the earliest months of the pandemic, the artist recalls, he and a group of remote colleagues were navigating the still-bizarre realm of Zoom encounters. One fateful day, one of his friends became inadvertently trapped in a video filter that apparently turned their face into a pickle. The caller was embarrassed. Wiriadjajas first impulse was to make them feel better.

So I took [a part of] my dinner, which was a piece of kale, put it on my face and said 'Hey, I have a filter on as well, Wiriadjaja told Decrypt at NFC Lisbon earlier this week.

The pickled participant was delighted, their shame washed away, and they asked Wiriadjaja what he was going to wear tomorrow. Foodmasku was born.

In the following weeks and months, Wiriadjaja dedicated himself to the mission of creating, documenting, and eating food masks. Banana eyes, broccoli nostrils, noodle noses, shrimp eyebrows... every day, a new sumptuous self-portrait.

The project steadily gained steam, but that success was a double-edged sword: people were so enamored with Wiriadjajas food masks that phony Foodmasku accounts began popping up across numerous social media platforms.

This was March 2021, and Wiriadjaja was frustrated. There had to be a way to own digital files, to protect his edible oeuvre. He did some searching online and came across NFTs. The artist Beeple had just sold an NFT artwork for $69 million, catapulting the emerging technology into the mainstream.

So Foodmasku became a Web3 artist. Not out of an ideological or artistic commitment to the ethos of decentralization, but insteadas with the inciting kale flapbecause it just made sense.

To date, Wiriadjaja has created almost 2,000 Foodmasku NFTs, generating about 50 ETH, or $92,000, in sales.

The artist, who was born in Indonesia and raised in Boston, has faced different reactions to his works across various cultures and contexts. A through-line, hes found, is that people across the world tend to be afraid of technology.

Technology is scary to everyone, everywhere, he said. Indonesians are worried that technologys going to kill off their traditional arts, Americans are worried technologys going to take all of their jobs. But one thing everybody relates to is food.

If foods and masks and emergent digital technologies can be brought together to give Wiriadjajas colorfully inventive and optimistic portraits a cohesive thesis, it might be that any medium possesses the capacity to tap into the universal vibrancy of humanity.

In that vein, Wiriadjaja has recently become fascinated with artificial intelligence. Hes developing a project called Proof of Eat, which is intended to clear the air on the increasing disquiet prompted by blurring of the line between humans and machines.

One big test of whether a creator is human or not, is if they can eat food, he said.

View original post here:

Foodmasku Dishes Out Edible Masks on Ethereum - Decrypt

Read More..

6 internet habits that can compromise your cybersecurity The … – The European Sting

(Credit: unsplash)

This article is brought to you thanks to the collaboration ofThe European Stingwith theWorld Economic Forum.

Author: Check Point

Nowadays we cannot live without the Internet, a basic resource among the new generations. Remember looking for information in an encyclopedia or going to a travel agency to buy a plane ticket or make a hotel reservation? It seems like ages ago, but the truth is that the network of networks has changed the way we do many tasks and has opened the doors to new possibilities that allow us, for example, to work from anywhere or make a bank transfer from our phone in just one click.

Unfortunately, this relentless evolution is also present in the multiple threats posed by cybercriminals. We have moved on from viruses distributed on floppy disks and Morris, the first worm to infect the Internet in 1988, to the emergence of Trojans, spyware and ransomware, the main protagonists of todays cybercrime scene. According to the Security Report 2023 from Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading global cyber security specialist provider, cyberattacks have increased by 38% in 2022 compared to the previous year, with an average of 1,168 attacks per week per organization and a situation that looks set to continue to worsen over the coming years.

Discover

What is the World Economic Forum doing on cybersecurity?

The World Economic Forum Centre for Cybersecurity drives global action to address systemic cybersecurity challenges. It is an independent and impartial platform fostering collaboration on cybersecurity in the public and private sectors. Here are some examples of the impact delivered by the centre:

Cybersecurity training: Salesforce, Fortinet, and the Global Cyber Alliance, in collaboration with the Forum, provide free and accessible training to the next generation of cybersecurity experts worldwide.

Cyber resilience: Working its partners, the Centre is playing a pivotal role in enhancing cyber resilience across multiple industries: Oil and Gas, Electricity, Manufacturing and Aviation.

IoT security: The Council on the Connected World, led by the Forum, has established IoT security requirements for consumer-facing devices, safeguarding them against cyber threats. This initiative calls upon major manufacturers and vendors globally to prioritize better IoT security measures.

Paris Call for Trust and Security in Cyberspace: The Forum is proud to be a signatory of the Paris Call, which aims to ensure global digital peace and security, emphasizing the importance of trust and collaboration in cyberspace.

Contact us for more information on how to get involved.

All of this makes it clear that we need to be prepared to face these threats, which is why Check Point Software has assembled this list of tips to remind us of the bad habits that we continue to maintain and that affect our digital security:

This is one of the most common mistakes, and yet one of the practices that most affects the maintenance of proper cybersecurity. We all find it easier to recycle passwords and use the same one for work and personal emails, but we are putting important data at risk. It is also very common to share them Netflix or Spotify passwords, for example and oftentimes we write them down or send them in a message or email to family or close friends. This reality translates into millions of users who every year see their accounts breached because they do not take care of their passwords. To avoid this, it is advisable to create secure passwords, with at least 12 characters and a combination of uppercase and lowercase letters, numbers, and special characters. Likewise, it is always recommended to update them every few months, and not to reuse them on several different platforms or accounts.

All systems and devices have regular updates designed not only to improve or correct usability, but also to apply patches for possible vulnerabilities. The message to update often appears at inconvenient times or when we do not have a Wi-Fi connection and we usually end up postponing or even ignoring its installation, unconsciously leaving an open door for cyberattacks. Just by keeping our devices up to date, we can avoid many of the vulnerabilities that can occur.

While most cyberattacks today focus on data theft, there has recently been a growth in hacktivist practices and other state-related threats. This type of practice often includes the distribution of disinformation with fake news or biased and incomplete messages that prey on the emotional side of users to generate discord. For this reason, it is advisable to use several sources when informing ourselves, as well as to check any news or chain message before falling into practices such as mass dissemination. One of the main pillars of Internet security is common sense.

To avoid using up your own data, it is increasingly common to surf between hot spots and free Wi-Fi networks in restaurants, airports, train or metro stations, hotels and even public or private transport. However, security researchers have demonstrated on numerous occasions that these types of wireless networks have little or no security. It is advisable not to access an unknown network, but if you must, limit your use to basic browsing, avoid entering passwords or using sensitive applications such as payment platforms or banking access.

Who ever reads the terms and conditions of data use? These lengthy and difficult to understand texts encourage most people to accept all the terms of use for any application without further ado. While this allows us to start enjoying them more quickly, it can lead to a serious security problem and even a breach of all our data. On the one hand, cybercriminals often use some popular applications or programs to spread their malicious code, while some malicious developers hide some clauses for the transfer of permissions to collect, store and even trade with this data. By taking a few minutes to review the permissions and conditions before installing a program, we can avoid falling victim to deception or exposure of our personal information.

A way to identify this type of fraudulent website is to look for small errors such as typos, poorly written text or the presence of misleading or poor-quality images. However, the most effective method is undoubtedly the analysis of the URL, with security indicators such as SSL certificates (indicated by the presence of a padlock next to the web address); or alerts, such as the presence of irregular characters or subdomains.

Although the Internet is still a fairly young tool, we already have a lot of experience at our disposal to avoid becoming victims of cyber attackers. Once again, we must call for education and common sense, as education and knowledge are key to achieving a safe digital space for everyone.

Like Loading...

Related

Go here to see the original:
6 internet habits that can compromise your cybersecurity The ... - The European Sting

Read More..

Adoption strategy of Bitcoin, Ethereum, and DogeMiyagi – Analytics Insight

As cryptocurrency becomes vastly normalised in the modern day, the adoption of various coins is becoming commonplace in many industries. Bitcoin (BTC) and Ethereum (ETH) are two of the most widely used cryptocurrencies, and as they continue to be accepted in many different use cases, while new currencies like DogeMiyagi (MIYAGI) have emerged as fascinating projects with a unique adoption strategy.

Different features of these coins contribute to the wider acceptance and use of cryptocurrencies, and with their adoption strategies the wider financial market is turning to crypto to explore fresh new approaches to the economy. So, lets take the time to access these tokens, to see how they fare in the world of finance.

DogeMiyagi (MIYAGI), a rising star in the crypto world, has garnered attention through its distinctive adoption strategy. The projects focus on meme-inspired branding and community engagement sets it apart from traditional cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH). DogeMiyagi leverages the popularity of meme culture to attract a wide audience, particularly younger individuals who are more familiar with internet trends.

The team behind DogeMiyagi has successfully tapped into the power of social media platforms, creating a strong online presence. Through humorous and relatable content, they have captured the attention of crypto enthusiasts and those new to the space. By using comical elements and catchy phrases, as well as a sense of nostalgia, DogeMiyagi has created a sense of FOMO (Fear of Missing Out) among potential investors, further driving the adoption of their cryptocurrency.

In contrast to DogeMiyagis (MIYAGI) meme-driven approach, Bitcoin (BTC) and Ethereum (ETH) have established themselves as stalwarts in the crypto industry. BTC, often referred to as digital gold, gained popularity due to its decentralisation and limited supply. ETH, on the other hand, revolutionised the space by introducing smart contracts and paving the way for decentralised applications (DApps).

BTC and ETHs adoption strategies have been shaped by their technological advancements and the communitys recognition of their potential as digital assets. BTCs rise was driven by its store of value narrative and the increasing demand for a censorship-resistant digital currency. ETH, with its programmable blockchain, opened up a world of possibilities for developers and businesses seeking to leverage decentralised applications.

Several factors contribute to the wider acceptance and use of cryptocurrencies like DogeMiyagi (MIYAGI), Bitcoin (BTC), and Ethereum (ETH). First and foremost, technological advancements and the increasing ease of access have lowered barriers to entry, attracting a broader audience. Additionally, the growing recognition of cryptocurrencies as an alternative investment has led to increased adoption.

Community engagement and marketing play crucial roles in the success of any cryptocurrency. DogeMiyagis emphasis on meme culture and its active presence on social media platforms have resonated with a younger demographic, driving adoption. BTCs and ETHs established communities, built over the years, have also contributed to their widespread use.

Furthermore, partnerships with established institutions and integration into mainstream financial systems have played a vital role in wider acceptance. As more companies and payment processors begin to accept cryptocurrencies as a form of payment, the use and adoption of digital assets continue to expand.

DogeMiyagis (MIYAGI) adoption strategy, rooted in meme culture and community engagement, sets it apart from Bitcoin (BTC) and Ethereum (ETH). While the established giants of the crypto industry rely on technical advancements and their respective narratives, MIYAGI leverages humour and relatability to attract a wider audience.

The factors driving wider acceptance and use of cryptocurrencies include technological advancements, ease of access, community engagement, marketing strategies, and integration into mainstream financial systems. As more industries accept that crypto is the future, its strength in the financial sector will only continue to grow.

Website: https://dogemiyagi.com

Twitter: https://twitter.com/_Dogemiyagi_

Telegram: https://t.me/dogemiyagi

Read the original post:

Adoption strategy of Bitcoin, Ethereum, and DogeMiyagi - Analytics Insight

Read More..

Guardz Launches AI-Powered Multilayered Phishing Protection To … – PR Newswire

With more than 3 billion phishing emails sent every day, Guardz protects SMEs from the increased risk of this growing attack vector

TEL AVIV, Israel, June 8, 2023 /PRNewswire/ -- Guardz, the cybersecurity company securing and insuring SMEs, today announced a new AI-powered Multilayered Phishing Protection solution to help small and medium-sized enterprises (SMEs) and managed service providers (MSPs) prevent phishing attacks before their security is compromised. The hassle-free and cost effective solution uses AI to provide small businesses and the MSPs that support them with automatic detection and remediation capabilities to protect against phishing attacks the number one threat they face. By combining email security, web browsing protection, perimeter posture, and awareness culture in one native solution, businesses can now efficiently safeguard against phishing threats, bolstering resilience and future-proofing their systems.

Ninety percent of all cyber attacks are initiated with phishing, which relies on social engineering to prey on human nature. Cybercriminals attempt to obtain sensitive information such as usernames, passwords, and credit card details by tricking recipients clicking on malicious links or providing personal information, which can then be used for identity theft, ransomware attacks, or other malicious activities. These attacks can result in data breaches, financial loss, and reputational damage to small businesses and even compromise the security of a business's entire network, leading to the exposure of further confidential information.

Guardz's new Multilayered Phishing Protection: continuously scans for all inbound traffic with its advanced anti-phishing email protection solution; initiates detection through AI-powered anti-phishing and anti-malware engines; removes risky emails from users' inboxes and automatically sends them to quarantine; monitors internet browsing to detect potential phishing attempts and delivers real-time alerts to system admins to enable timely responses; and provides ongoing, active cyber awareness training and tailored phishing simulations for employees, fostering a culture of caution and vigilance. Perhaps most importantly when dealing with phishing, the Guardz solution empowers every employee to behave in ways that support and strengthen the business's cybersecurity posture.

"The proliferation of phishing attack as a service (AaaS) tools sold on the dark web is putting the SME ecosystem increasingly at risk. Our new AI-powered phishing protection solution provides SMEs and MSPs with a holistic and accessible solution to prevent the success of phishing attacks," said Dor Eisner, CEO and Co-Founder of Guardz. "This is a significant addition to Guardz's holistic cyber security offering for small businesses, ensuring that they can react to cyber risks in real time with swift remediations, but also be protected by cyber insurance for complete peace of mind a true secure and insure approach."

The Multilayered Phishing Protection enables MSPs to provide their SME customers complete protection across all potential phishing attack vectors. It does so by automatically scanning the perimeter posture, inbound email traffic and internet browsing, and by providing ongoing, tailored cyber awareness training and simulation for employees. The platform automatically verifies emails for authentication protocols including Domain-based Message Authentication, Reporting and Conformance (DMARC), Sender Policy Framework (SPF) and checks for malicious forwarding rules.

The new Multilayered Phishing Protection solution is available now from Guardz. For further details, please visit Guardz's website:https://guardz.com/phishing-protection/

About Guardz

Guardzis a holistic cyber security and insurance solution designed for SMEs. Guardz's solution continuously monitors businesses' digital landscapes to protect their entire range of assets, enables them to react to cyber risks in real time with swift remediations, and provides cyber insurance for peace of mind. Its all-in-one, affordable platform is on guard 24/7, and is easy to use for both in-house IT personnel and MSPs. With cutting-edge technologies stacked into a robust platform, Guardz was founded in 2022 by Dor Eisner and Alon Lavi along with a team of cyber and insurance experts who combine innovation, experience, and creativity to create a safer digital world for small businesses.

Media Contact

Allison GreyHeadline Media[emailprotected]US: +1 323 283 8176UK: +44 203 807 4482IL: +972 53 820 2606

SOURCE Guardz

Link:
Guardz Launches AI-Powered Multilayered Phishing Protection To ... - PR Newswire

Read More..

From Passwords To AI: The Future Of Cybersecurity In The Digital Age – Tech Build Africa

As the pace of digital change accelerates, so will the quantity and intelligence of data breaches. Even if you have a team of professionals working together to improve internet security, be rest assured that phishers, hackers, scammers, and fraudsters are becoming more advanced by the day, to break into your secured vault.

The globe is researching alternate authentication techniques and moving away from depending entirely on standard passwords.

While AI does not replace passwords directly, it does play a role in enabling more secure and convenient authentication processes.

AI is a strong technology that provides sophisticated capabilities for combating assaults by detecting and preventing threats as well as securing networks and services, compared to conventional cybersecurity techniques, which only detect known risks, AI uses autonomous algorithms and learning patterns to avoid future assaults.

The field of cybersecurity is undergoing substantial shifts in the digital age, with old password-based systems being supplemented and, in certain instances, supplanted by AI-driven solutions.

Beyond conventional password-based tactics, the future of cybersecurity involves integrating AI technology to improve threat detection, enhance authentication methods, assess risks, and implement proactive defense mechanisms.

As AI advances, it will become increasingly important in bolstering cybersecurity defenses in the digital age

Lets take a look at the future of cybersecurity where it transitions away from passwords and toward AI:

With the advancement of technology, passwords have become very vulnerable to theft, loss, or poor user behavior.

Biometric identification, such as fingerprint, iris, or facial recognition, is a safer and more user-friendly option. AI algorithms are critical in correctly recognizing and verifying biometric data.

Furthermore, behavioral authentication analyzes user behavior characteristics, such as typing speed or mouse movements, to authenticate users without depending simply on passwords.

Also, conventional techniques of detecting and responding to cyber threats frequently fail to keep up with the threat landscapes rapid evolution.

AI-powered cybersecurity solutions can more effectively analyze large amounts of data, discover trends, and detect anomalies.

Machine learning algorithms may learn from new data indefinitely to increase threat detection accuracy and automate responses, allowing firms to remain ahead of emerging dangers, passwords cant cut it

By evaluating historical data, user activity, and network patterns, AI-driven predictive analytics can analyze prospective cybersecurity vulnerabilities.

These insights enable firms to discover vulnerabilities proactively and make informed decisions to eliminate risks before they become major security breaches.

Conventional cybersecurity methods tend to depend on static rules and signatures, which can be circumvented by smart attackers.

AI allows the creation of adaptive security systems capable of learning and adapting to new threats in real-time.

These systems may automatically adapt their defenses in response to changing attack patterns, resulting in a more robust security posture.

AI technology can be used to proactively look for sophisticated threats and vulnerabilities in threat hunting and intelligence collecting.

To identify prospective risks and anticipate attack routes, AI algorithms may scan massive volumes of data from numerous sources, such as threat intelligence feeds, dark web tracking, and security logs.

As AI gets more integrated into cybersecurity, privacy, and ethical concerns become increasingly important.

AI models should be built and implemented using privacy-preserving strategies to ensure te safety of users personal data.

Furthermore, to avoid misuse or unforeseen repercussions, ethical AI norms like transparency, fairness, and accountability should be followed.

Dont miss important articles during the week. Subscribe totechbuild weekly digestfor updates.

More here:
From Passwords To AI: The Future Of Cybersecurity In The Digital Age - Tech Build Africa

Read More..

The ETH Question: Why does the SEC avoid taking action against Ethereum when all else are fair game? – CryptoSlate

The U.S. Securities and Exchange Commission (SEC) filed suit against Binance today in a move that has rocked the cryptocurrency industry.

The complaint notably includes language in which the SEC clearly elucidates that it considers many of the tokens that traded on Binance to be unregistered securities and lays out its case against several it considers notable offenders. The SEC identifies these crypto asset securities as including (but not limited to) Solana, Cardano, Polygon, Filecoin, Cosmos, The Sandbox, Decentraland, Algorand, Axie Infinity, and Coti.

Todays filing contains some of the SECs most explicit language to date in clarifying its judgment, but once again avoids taking on the big question: is Ethereum a security or not? If so, why is the SEC silent on it? And if not, what is it?

The SECs argument for designating these tokens as crypto asset securities is exhaustively outlined in Section VIII of the complaint (pages 85 through 123). Notable patterns emerge from the filing: the process of initial coin offerings (ICOs), vesting of tokens, allocations for the core team, and the promotion of profit generation through ownership of these tokens, are all repeated themes.

But Ethereum is not listed among these. Gensler has remained consistently vague on the question of whether Ethereum and its namesake coin count as securities. ETH is commonly held as an investment, suggesting it could be classified as a security, but it is also extensively used day-to-day as a medium of exchange across protocols, making its function more akin to cash or ACH settlement.

Gensler has previously suggested that everything other than Bitcoin in the crypto space could be seen as a security, but has notably refused to clearly state as much about Ethereum. When pressed to say the words, I believe Ethereum is a security, the Hon. Chair just will not do it. Genslers reluctance to classify Ether is curious when his SEC is so eager to claim as much for others. Why?

It might be a simple matter of intragovernmental contention. Ethereum could potentially fall under the purview of the Commodity Futures Trading Commission (CFTC), which regards Bitcoin, Ethereum, and Tether as commodities, not securities. Not only do the two categories differ wildly from one another, this overlap could create a regulatory tug-of-war that would Genslers public stance on Ethereum while trying to avoid the appearance of infighting within the federal government.

Another analysis from Protos, argues that Genslers evasion on the matter may be a consequence of the SECs earlier inaction following the infamous DAO hack, which saw the blockchain fork into Ethereum Classic and put the entire ecosystem at risk. However, at the time the SEC did nothing, and now Gensler finds himself in the unenviable position of making up for his predecessors oversights. Now that the Ethereum ecosystem has spent years recovering and building credibility, retroactively declaring it an unregistered security would have unforeseen, but no doubt disastrous, consequences for investors.

In other words, protecting investors in this case would mean protecting them from the protector.

However, perhaps another reason could lie beneath Genslers reluctance to clearly classify Ethereum: he may not know.

Cryptocurrencies and their underlying technologies are innovative and novel. They represent a fundamental shift in how we understand finance and asset ownership, and in the case of decentralized ecosystems like Ethereum, they introduce entirely new paradigms.

If this is true, its not unreasonable to suspect that most peopleeven those deeply involved in the spacemay not fully understand the implications of these innovations just yet. Anything that is fundamentally new will resist categorization, and Ethereum does sothis lack of a concrete concept that both defines Ethereum but fits into previous understandings is the core problem around regulating it.

This regulatory ambiguity presents a complex challenge for Ethereum, but it does not lessen the urgency to address it.The advancement of the crypto industry hinges on obtaining clear legal definitions for Layer 1 (L1) tokens, such as Ethereum, that function simultaneously as mediums of daily exchange and investment vehicles within their respective ecosystems. The ambiguity in their status poses a significant hurdle, stalling progress and fostering uncertainty in a space that is ripe for growth and innovation.

The dichotomy of these tokens roles blurs the boundary between conventional asset classes, forcing us to confront inadequacies in existing legal structures. To propel the crypto industry forward, regulators must acknowledge and address this nuanced reality. Until a refined framework emerges that accurately captures the dual functionality of these L1 tokens, regulatory ambiguity will continue to shroud the industry, stifling its full potential and deterring mainstream adoption. This unique crypto space requires equally unique rulesones that can encapsulate its dynamism and complexity.

The path towards comprehensive crypto regulation is obscured by two significant obstacles, which must be addressed urgently for the sectors responsible advancement.

Firstly, the U.S. Securities and Exchange Commission (SEC) must establish a formal position on Ethereum. Given the SECs historical inaction in restraining Ethereums growth when opportunities were present, it has inadvertently fostered an environment where investors are left in regulatory limbo. The SEC, as the protector of investors, has a duty to provide some form of regulatory guidanceeven if it proves to be temporaryto offer a foundational starting point and eliminate the current state of speculation. The lack of clear regulation is not merely an inconvenience; it is a failure to provide the necessary protections for participants in an increasingly significant market.

Secondly, authentic, open-ended discussions about the nature of digital assets are crucial. This implies engaging in conversations devoid of preconceived notions, biases, ideological posturing, or empty rhetoric. We often speak of making space to have the conversation, but acknowledging that conversation needs to take place and actually having one are two very different exercises indeed. Perhaps everyone in the industryas well as those watching over itwould benefit from practicing the latter.

Commitment to Transparency: The author of this article is invested and/or has an interest in one or more assets discussed in this post. CryptoSlate does not endorse any project or asset that may be mentioned or linked to in this article. Please take that into consideration when evaluating the content within this article.

Disclaimer: Our writers' opinions are solely their own and do not reflect the opinion of CryptoSlate. None of the information you read on CryptoSlate should be taken as investment advice, nor does CryptoSlate endorse any project that may be mentioned or linked to in this article. Buying and trading cryptocurrencies should be considered a high-risk activity. Please do your own due diligence before taking any action related to content within this article. Finally, CryptoSlate takes no responsibility should you lose money trading cryptocurrencies.

More here:

The ETH Question: Why does the SEC avoid taking action against Ethereum when all else are fair game? - CryptoSlate

Read More..