Page 2,189«..1020..2,1882,1892,1902,191..2,2002,210..»

Exposing the Internet-Connected Infrastructure of the REvil Ransomware Gang An In-Depth OSINT Analysis – Security Boulevard

In this post Ive decided to do an in-depth OSINT analysis on the recently busted REvil ransomware gang and decided to elaborate more and emphasize on the key fact in specific how come that a single ransomware group with several publicly accessible and easy to shut down C&C (command and control) server domains including several randomly generated Dark Web Onion URLs could easily result in millions of damage and who really remembers a situation when getting paid for getting hacked including the basic principle that you should never interact with cybercriminals but instead should passively and proactively monitor them could result in todays modern and unspoken ransomware growth epidemic and the rise of wrong buzz words as for instance ransomware-as-a-corporation where you basically have the bad guys obtain initial access to an organizations network and then hold its information encryption leading us to the logical conclusion who on Earth would pay millions of dollars to avoid possible bad reputation damage including to fuel growth into a rogue and fraudulent scheme as as for instance the encryption of sensitive company information and leaking it to the public in exchange for financial rewards.

Sample REvil ransomware gang publicly accessible C&C (command and control) servers include:

hxxp://1-you[.]njalla[.]no

hxxp://3-get[.]njalla[.]fo

hxxp://2-can[.]njalla[.]in

hxxp://1-you[.]njalla[.]no

Related responding IPs for hxxp://decryptor[.]cc:

2021/12/30 103[.]224[.]212[.]219

2021/10/23 198[.]58[.]118[.]167

2021/10/23 45[.]79[.]19[.]196

2021/10/23 45[.]56[.]79[.]23

2021/10/23 45[.]33[.]18[.]44

2021/10/23 72[.]14[.]178[.]174

2021/10/23 45[.]33[.]2[.]79

2021/10/23 45[.]33[.]30[.]197

2021/10/23 96[.]126[.]123[.]244

2021/10/23 45[.]33[.]23[.]183

2021/10/23 173[.]255[.]194[.]134

2021/10/23 45[.]33[.]20[.]235

2021/10/23 72[.]14[.]185[.]43

2021/10/08 78[.]41[.]204[.]37

2021/10/03 209[.]126[.]123[.]12

2021/09/24 78[.]41[.]204[.]28

2021/09/03 209[.]126[.]123[.]13

2021/08/19 78[.]41[.]204[.]38

2021/08/02 81[.]171[.]22[.]4

2021/07/27 81[.]171[.]22[.]6

2021/04/17 103[.]224[.]212[.]219

2020/11/10 45[.]138[.]74[.]27

2020/11/04 45[.]138[.]74[.]27

2020/09/14 136[.]243[.]214[.]30

2020/09/06 136[.]243[.]214[.]30

2020/08/30 212[.]22[.]78[.]23

2020/08/23 212[.]22[.]78[.]23

2020/07/30 212[.]22[.]78[.]23

2020/07/24 212[.]22[.]78[.]23

2020/07/07 212[.]22[.]78[.]23

2020/05/30 193[.]164[.]150[.]68

2020/05/20 193[.]164[.]150[.]68

2020/05/10 194[.]36[.]190[.]41

2020/05/08 194[.]36[.]190[.]41

2020/04/29 194[.]36[.]190[.]41

2020/04/06 194[.]36[.]190[.]41

2020/02/17 94[.]103[.]87[.]78

Related responding IPs forhxxp://decryptor[.]top (185[.]193[.]127[.]162; 192[.]124[.]249[.]13; 96[.]9[.]252[.]156):

2021/07/12 45[.]9[.]148[.]108

2020/09/18 185[.]193[.]127[.]162

2020/09/15 185[.]193[.]127[.]162

2020/08/07 185[.]193[.]127[.]162

2020/01/16 162[.]251[.]120[.]66

2019/12/23 45[.]138[.]96[.]206

2019/12/12 107[.]175[.]217[.]162

2019/10/07 96[.]9[.]252[.]156

2019/09/04 96[.]9[.]252[.]156

2019/07/15 91[.]214[.]71[.]139

Related MD5s known to have been involved in the campaign:

MD5: 57d4ea7d1a9f6b1ee6b22262c40c8ef6

MD5: fe682fad324bd55e3ea9999abc463d76

MD5: e87402a779262d1a90879f86dba9249acb3dce47

MD5: 4334009488b277d8ea378a2dba5ec609990f2338

MD5: 2dccf13e199b60dd2cd52000a26f8394dceccaa6

Stay tuned!

Read more from the original source:
Exposing the Internet-Connected Infrastructure of the REvil Ransomware Gang An In-Depth OSINT Analysis - Security Boulevard

Read More..

ESET picked for its Advanced Threat Protection solutions – Trade Arabia

ESET, a global leader in cybersecurity, has been awarded top marks for its business and consumer offerings in two separate AV-Comparatives tests relating to Advanced Threat Protection.

The ESET Protect Cloud solution ranked at the top among competitors in the AV-Comparatives Advanced Threat Protection Test Enterprise, and ESET Internet Security for consumers was a high achiever in the AV-Comparatives Advanced Threat Protection Test Consumer.

AV-Comparatives, a leading independent testing organisation, well-known for offering innovative real-world environment testing, has subjected ESETs enterprise solution to hacking and penetration techniques that allow attackers to access internal computer systems and which mimic threats used in the real world.

ESET Protect Cloud came out of this rigorous testing with AV-Comparatives certification for Advanced Threat Protection, which is awarded to products that pass, and in ESETs case the product not only passed but also achieved the top results among its peers, being the only solution that detected 14 out of the 15 attack scenarios.

ESETs consumer solution was also put through rigorous testing in a separate AV-Comparatives test, which aimed to uncover how well the solution can protect the end user rather than simply detect threats. ESET Internet Security achieved solid marks for its protection and was awarded the Advanced Threat Protection certification Advanced+ level.

Juraj Malcho, ESETs Chief Technology Officer commented on the achievement: No cyber security solution is perfect but at ESET we always strive to be the best, and we are very happy to see that a highly respected independent testing organisation like AV-Comparatives confirms that we are delivering on our promise.-- TradeArabia News Service

Continued here:
ESET picked for its Advanced Threat Protection solutions - Trade Arabia

Read More..

Internet Security Global Opportunity Analysis and Industry Forecast 2021-2029 Discovery Sports Media – Discovery Sports Media

The objective of this report is to provide a global, regional and national assessment of the Internet Security market potential and existing products, services, and future market sizes. It is crucial because the Internet Security market varies substantially in terms of regional characteristics and depending on the technology in question.

Get a Sample Copy of this report at: https://www.qyreports.com/request-sample/?report-id=323933

Many employees from well-known companies have been interviewed through telephone conversations to extract and analyze the sources of information collected. In addition, a brief study of the major players operating in the Global Internet Security Market was also undertaken. For data extraction, preliminary assessments are made with executives and players in the industry, and the future of significant players is studied and analyzed.

This research study analyzed the status of the company, which is divided into application width, bottom line, product type, and competition level. It describes how COVID-19 will affect the amount of money they receive, the amount of money they receive, and the expected growth rate for each group. The Internet Security study gives an industry analysis based on a detailed evaluation of market dynamics and the Markets top suppliers. Based on the information received, the in-house analysis provides accurate data details and minimizes exposure.

Ask for Discount: https://www.qyreports.com/ask-for-discount/?report-id=323933

Internet Security Market Leading Companies:

Type Analysis of the Internet Security Market:

Application Analysis of the Internet Security Market:

Inquiry before moving ahead with this premium Report: https://www.qyreports.com/enquiry-before-buying/?report-id=323933

Key Highlights of the Report:

This study provides an overview of the Internet Security global market as well as current trends as well as future prospects to identify upcoming investment portfolios. Internet Security marketing analysis supported by historical, current, and company plans with market size information supported by data in value and volume, wherever it is located.It is expected that industry-leading factors and manufacturers will influence the industry from now on. The introduction of the Key Strategy Marketing and Key Marketing Channel is welcomed in the market Internet Security Market Attractiveness Analysis and Key Investment Opportunity Analysis in the Market in the future Technological Roadmap, Patents Analysis, Potential Substitutes, and Technical Analysis

About Us:

We at QYReports, a leading market research report publisher cater to more than 4,000 prestigious clients worldwide meeting their customized research requirements in terms of market data size and its application. Our list of customers include renouned Chinese companies multinational companies, SMEs and private equity firms. our business study covers a market size of over 30 industries offering you accurate, in depth and reliable market insight, industry analysis and structure. QYReports specialize in forecasts needed for investing in an and execution of a new project globally and in Chinese markets.

Contact Us:

Name: Jones John

Contact number: +1-510-560-6005

204, Professional Center,

7950 NW 53rd Street, Miami, Florida 33166

sales@qyreports.com

http://www.qyreports.com

View original post here:
Internet Security Global Opportunity Analysis and Industry Forecast 2021-2029 Discovery Sports Media - Discovery Sports Media

Read More..

The Product Security and Telecommunications Infrastructure Bill 2021-22 – House of Commons Library – Commons Library

The Product Security and Telecommunications Infrastructure Bill has its second reading on 26 January 2022.

The Bill would:

Information about the Bills stages and related publications is provided on the Parliamentary Bill page.

Part 1 of the Bill relates to powers to introduce mandatory security requirements for connectable products such as smart phones, smart TVs and connected speakers. These products may also be described as smart devices, or internet of things (IoT) devices.

Connectable products are required to meet certain safety standards, but there are currently no mandatory security requirements. There is growing concern about the risks to consumers associated with some of these products, through breaches in safety and privacy and their potential for use in wider cyber-attacks.

The Government published a voluntary Code of Practice for Consumer IoT Security, in 2018. It provided manufacturers and others with guidance (13 principles) on good practice to ensure connectable products were secure.

In response to poor uptake of the Code of Practice and continued risks to consumers, the Government consulted in 2019 on introducing mandatory security requirements for connectable products. Legislative proposals were consulted on in 2020.

The Bill would provide regulation-making powers for the Secretary of State to introduce security requirements for connectable products sold in the UK.

The Government has said that it intends the following products to be affected by the Bill:

Some products would be excluded, such as smart meters, medical devices, vehicles and smart chargepoints (for electric vehicles).

The Government said it will use the powers under clause 1 of the Bill to introduce the top three guidelines from the Code of Practice:

It would also place duties on manufacturers, importers and distributers of these products to ensure compliance with the statutory requirements and to take action where a compliance failure has occurred.

The Bill sets out a number of enforcement measures that could be taken when there is a breach of compliance. For serious issues of non-compliance, the Bill sets the maximum penalty at 10 million or 4% of the companys worldwide revenue.

Part 2 of the Bill would make changes to the electronic communications code (ECC). The ECC is the main law that governs the rights of telecoms companies to install infrastructure on land, UK-wide.

The ECC was significantly reformed in 2017. This included changes to rights to upgrade and share infrastructure and changes to dispute resolution processes. It also included changes to how land is valued when determining rent for hosting telecoms equipment under a court-imposed agreement.

Reforms to the ECC have always been highly contested, with often strongly opposing views between telecoms operators and site providers (landowners). The Government has to strike a difficult balance between ensuring digital connectivity is widely available while property rights are respected.

The land valuation reforms have been particularly controversial, with reports thatrents for hosting telecoms equipment have reduced, in some cases dramatically. The ECC is said to be causingdelays to infrastructure roll-out through lengthy negotiations and legal proceedings.

The Governments consultation that informed the Bill did not revisit the topic of land valuation.

The Bill aims to encourage faster and more collaborative negotiations for the installation and maintenance of telecoms equipment on private land. The Government says this would help ensure the efficient roll-out of digital infrastructure such as gigabit-broadband and 5G.

The main changes the Bill would make include:

Telecoms operators and site providers had opposing views on most of the above changes, with telecoms operators agreeing that changes should be made and most site providers disagreeing.

The Bill would apply to all of the UK.

Here is the original post:
The Product Security and Telecommunications Infrastructure Bill 2021-22 - House of Commons Library - Commons Library

Read More..

CipherTrace CEO David Jevans Named to 2022 Wash100 for Leading Digital Currency Innovation, Driving Blockchain Technology & Security -…

David Jevans, CEO of CipherTrace was named to the list of 2022 Wash100 Award recipients, the most coveted award in all of government contracting (GovCon), for his visionary leadership as Cipher Trace CEO as well as driving innovative blockchain capabilities and being one of the first to adopt cryptocurrency in the late-90s.

Executive Mosaic is pleased to recognize Jevans as a Wash100 winner for the first time in his long career in industry and cryptocurrency. Visit Wash100.com to cast a vote for David Jevans as one of your TEN votes to advocate for your favorite leaders in the federal and government sectors.

In addition, Jevans will act as a panelist at the Potomac Officers Clubs Digital Currency and National Security Forum on Thursday to give his perspective on the potential implications, risks, challenges and opportunities digital currencies pose to the future of U.S. economy and national security along with several other crypto experts and industry leaders.

Visit PotomacOfficersClub.com to learn more about the future of decentralized cryptocurrency from industry leaders like David Jevans who has been involved with digital currencies since the late-90s. Click here to register for Thursdays Digital Currency and National Security Forum.

During an appearance on CNBCs Squawk on the Street, Jevans detailed the challenges of maintaining crypto hygiene and provided an introduction to CipherTrace as a market leader in blockchain and cryptocurrency anti-money laundering software.

At CipherTrace, we provide a capability to effectively de-anonymize, not at the individual level, but to track the funds all the way from crypto exchanges through banks, Jevans explained. We look at money laundering services, criminal activity, ransomware, and we help companies, banks, cryptocurrency exchanges, government regulators or law enforcement, to keep the bad guys out of the system.

More recently, CipherTrace was acquired by Mastercard in order to create an integrated offering that combines AI, cyber and blockchain capabilities to provide businesses with greater transparency to identify and understand the risks and manage compliance obligations. Since the acquisition, Jevans has joined Mastercard as an executive vice president to continue the mission.

Back in July, CipherTrace began a partnership with BAE Systems Applied Intelligence to integrate the companys market-leading cryptocurrency intelligence software and transaction risk rating with BAEs NetReveal transaction monitoring solution.

The combination offers financial institutions additional protection from cryptocurrency laundering risks and crypto-related threats, while providing detailed information that can be used to achieve regulatory compliance.

Identifying risky crypto transactions using blockchain analytics services and flagging cross border payments to offshore VASPs are now a business imperative, Jevans elaborated. CipherTraces technology allows financial institutions and cryptocurrency exchanges to detect unauthorized money movements and helps to prevent potential sanction violations.

As an industry expert on cybersecurity, blockchain security, internet fraud and more, Jevans is an elite leader and is a pivotal driving force to lead CipherTrace with strong growth, top-name customers and a wide range of capabilities in cyber, eCrime and will continue to be one of the first and most significant drivers of blockchain across the federal sector and other critical areas.

Executive Mosaic is proud to recognize CipherTrace and David Jevans for being named a 2022 Wash100 Award recipient. As a first-time winner of the most coveted award in GovCon, Jevans has demonstrated a level of success and recognition that can only be recognized by the Wash100 Award and the GovCon community.

Visit Wash100.com to vote for David Jevans and others who you believe deserve the recognition as the most significant leader to the GovCon community and federal landscape.

View original post here:
CipherTrace CEO David Jevans Named to 2022 Wash100 for Leading Digital Currency Innovation, Driving Blockchain Technology & Security -...

Read More..

How gangs are using spoof applications to dupe people – Hindustan Times

Gurugram:

Members of several gangs posed as bank executives and duped at least 200 people across Haryana in the last two months on the pretext of increasing their credit card limits by using call spoofing applications, said police.

Police said similar cases were registered at Gurugram, Faridabad, Palwal, Nuh, Rewari, Hisar, Jind, Rohtak and Sonipat. They are still investigating over 400 complaints. Cyber crime police stations in all districts have written to banks and application developers to ensure safe and secure transactions but the process is taking time, said police.

Commissioner of police KK Rao said that victims believed the perpetrators because they used spoofing apps to make it seem like they were calling via banks real customer care numbers. People shared their credit card details and one-time passwords (OTP) with the perpetrators, who then transferred money from the victims bank accounts to their own, and withdrew it from different locations so that they could not be identified. The process of obtaining the perpetrators IP addresses and mobile locations is taking time, because of which the registration of several cases is getting delayed, he said.

Rao added, The suspects are using spoof applications such as X-lite, Eyebeam and Indicall and posing as bank officials, telecom executives and insurance agents to dupe people.

NK Singh, a senior manager with an automobile company and a resident of Sector 57 in Gurugram, said that he was duped of 1.75 lakh after a man posing as a bank executive offered to redeem points on his credit card and offered him an iPhone 13 Pro Max. I was on my way to a meeting and was in a hurry when the bank executive called me. He informed me that I had been offered the latest mobile phone and they want to send it to my house. I shared my address and he asked me to verify the credit card details. While on call, I received an OTP which he asked me to share with him and before the call got disconnected money was transferred from my savings account, he said.

In another incident, a 40-year-old woman was duped of 1.50 lakh after she shared the details of her bank account and OTP with a man posing as a bank executive. I received a call on December 15 from a man who introduced himself as a bank executive and offered me a free holiday package. It was a 15-minute call, I shared the OTP I received and 1.50 lakh was transferred from my account, she said.

The Gurugram Police have arrested over 55 members of at least six different gangs from Rajasthan, Uttar Pradesh, Madhya Pradesh, Bihar, Jharkhand, Telangana, Delhi and Nuh in the last two months in connection with similar cases.

According to police, during questioning, most suspects revealed they used different modus operandi to dupe people using spoof applications and emails. In many cases, they use mobile apps to create spoof emails supposedly sent by telecom providers, banks or social media sites. Once a user clicks on a link provided in the email, they are then susceptible to fraud.

In several cases, perpetrators also used the names of well-known placement companies and matrimony sites to dupe unsuspecting victims.

We received over 200 complaints whereing victims said they were duped on the pretext of jobs, loans and dating offers via emails. We tracked the emails and found that all the companies in question had no information about such mails being sent out. A thorough check revealed that the fraudulent mails were being sent with the help of spoofing apps, said Narender Kadiyan, Faridabad deputy commissioner of police (crime).

Police said it is convenient for perpetrators anywhere to send an email to anyone from any ID.

Narender Bijarnia, the superintendent of police (SP), Jind, said that perpetrators target victims after scanning their details and grievances on social media accounts and take advantage of their concerns and call them using spoofing apps. At times people post their bad experience son social media regarding banks, companies or loan issues. Perpetrators note the details and call the victims from a toll-free number posing as bank executives from the credit card division or senior managers of job portals, he said.

He added that victims follow their instructions and lose money from their accounts.

Commissioner Rao said: Perpetrators make spoof calls using X-lite and Eyebeam--these two apps are very popular these days. They display actual toll-free numbers of banks so that if anyone checks on the Internet, they assume it is a genuine call, he said.

According to cyber experts, hackers use several methods to steal victims money. Using spoofing applications is one method. There are also other applications such as Easy Loan- the moment you install the app, all your personal data is stolen from your device, including contacts and photos, which can then be misused to extort money. Also, by using screen-sharing apps such as Anydesk or Team Viewer, anyone can try to steal your OTPs, etc. from your device. They can also ask you to install apps such as SMS Forwarder, which automatically gives your OTP to hackers. Stay safe and call 155260 in case of any monetary loss or log on to http://www.cybercrime.gov.in, said Rakshit Tandon, a cyber security advisor.

Police said they have been spreading awareness and have asked people not to share their OTPs with anyone as no bank or insurance company asks for it.

.

Leena Dhankhar has worked with Hindustan Times for five years. She has covered crime, traffic and excise. She now reports on civic issues and grievances of residents....view detail

Link:
How gangs are using spoof applications to dupe people - Hindustan Times

Read More..

Kaibo Flex titanium alloy bone conductive headphones from $79 – Geeky Gadgets

The Kaibo Flex headphones also allow you to accept calls and support Microsoft Teams, Google Meet, Apple FaceTime and Zoom. Enabling you to use the bone conductive technology both at work and play. The headphones have been designed to securely stay in place whether you sitting in the office or running your favorite trail thanks to its titanium alloy frame and IP55 rating.

Early bird pledges are now available for the recently launched project from roughly $79 or 107 (depending on current exchange rates), offering a considerable discount of approximately 34% off the retail price, while the Kickstarter crowd funding is under way.

We want you to hear it all whether youre exercising outdoors, working from the local coffee shop, a multi-tasking parent at home or hard-of-hearing, our bone conduction headphones provide comfort and safety without sacrificing on audio quality. Bone conduction technology (BCT) works by sending sound vibrations to your inner ear through bone rather than the air in your ear canal. This means you can listen to your calls and music while leaving your ears open to hear your surroundings.

With the assumption that the Kaibo Flex crowd funding campaign successfully raises its required pledge goal and production progresses smoothly, worldwide shipping is expected to take place sometime around April 2022. To learn more about the Kaibo Flex bone conductive headphones project watch the promotional video below.

Kaibo Flex also features two convenient quick-charge options that we know youll love: a 5-minute quick charge gives you a whole hour of battery life while a 45-minute charge gives you another 6 hours.

For a complete list of all available pledges, stretch goals, extra media and more features for the bone conductive headphones, jump over to the official Kaibo Flex crowd funding campaign page by checking out the link below.

Source : Kickstarter

Read more:
Kaibo Flex titanium alloy bone conductive headphones from $79 - Geeky Gadgets

Read More..

Orange Data Mining – Data Mining

Ferenc Borondics, Ph.D.

"The scientific community is in need of tools that allow easy construction of workflows and visualizations and are capable of analyzing large amounts of data. Orange is a powerful platform to perform data analysis and visualization, see data flow and become more productive. It provides a clean, open source platform and the possibility to add further functionality for all fields of science."

"I teach Orange workshops monthly to a diverse audience, from undergrad students to expert researchers. Orange is very intuitive, and, by the end of the workshop, the participants are able to perform complex data visualization and basic machine learning analyses. Most of our attendees have been able to incorporate this tool in their research practice."

"My laboratory produces large amounts of data from RNA-seq, ChIP-seq and genome resequencing experiments. Orange allows me to analyze my data even though I dont know how to program. It also allows me to communicate with my collaborators, who are experts in data mining, and with my colleagues and trainees."

Read the original post:

Orange Data Mining - Data Mining

Read More..

Russia proposes ban on use and mining of cryptocurrencies – CNBC

Russia's central bank on Thursday proposed banning the use and mining of cryptocurrencies on Russian territory, citing threats to financial stability, citizens' wellbeing and its monetary policy sovereignty.

The move is the latest in a global cryptocurrency crackdown as governments from Asia to the United States worry that privately operated and highly volatile digital currencies could undermine their control of financial and monetary systems.

Russia has argued for years against cryptocurrencies, saying they could be used in money laundering or to finance terrorism. It eventually gave them legal status in 2020 but banned their use as a means of payment.

In a report published on Thursday, the central bank said speculative demand primarily determined cryptocurrencies' rapid growth and that they carried characteristics of a financial pyramid, warning of potential bubbles in the market, threatening financial stability and citizens.

The bank proposed preventing financial institutions from carrying out any operations with cryptocurrencies and said mechanisms should be developed to block transactions aimed at buying or selling cryptocurrencies for fiat currencies.

The proposed ban includes crypto exchanges. Cryptocurrency exchange Binance told Reuters it was committed to working with regulators and hoped the report's release would spawn dialogue with the central bank on protecting the interests of Russian crypto users.

Restrictions on owning cryptocurrency are not envisaged, said Elizaveta Danilova, head of the central bank's financial stability department.

Active cryptocurrency users, Russians have an annual transaction volume of about $5 billion, the bank said.

The central bank said it would work with regulators in countries where crypto exchanges are registered to collect information about the operations of Russian clients. It pointed to steps taken in other countries, such as China, to curb cryptocurrency activity.

In September, China intensified its crackdown on cryptocurrencies with a blanket ban on all crypto transactions and mining, hitting bitcoin and other major coins and pressuring crypto and blockchain-related stocks.

"For now there are no plans to ban cryptocurrencies similar to the experience of China," Danilova said. "The approach we have proposed will suffice."

Joseph Edwards, head of financial strategy at crypto firm Solrise Group, played down the report's significance, saying no one outside Russia would be losing sleep over it.

"Moscow, like Beijing, is always rattling its sabre over 'crypto bans', but Russia has never been a pillar of any facet of the industry in the same way as China has been at times," he said.

Russia is the world's third-largest player in bitcoin mining, behind the United States and Kazakhstan, though the latter may see a miner exodus over fears of tightening regulation following unrest earlier this month. read more

The Bank of Russia said crypto mining created problems for energy consumption. Bitcoin and other cryptocurrencies are "mined" by powerful computers that compete against others hooked up to a global network to solve complex mathematical puzzles. The process guzzles electricity and is often powered by fossil fuels.

"The best solution is to introduce a ban on cryptocurrency mining in Russia," the bank said.

In August, Russia accounted for 11.2% of the global "hashrate" - crypto jargon for the amount of computing power being used by computers connected to the bitcoin network.

Moscow-based BitRiver, which operates data centers in Siberia hosting bitcoin miners, said it did not consider a complete crypto ban likely, expecting a balanced position to develop once different ministries have discussed the proposals.

The central bank, which is planning to issue its own digital rouble, said crypto assets becoming widespread would limit the sovereignty of monetary policy, with higher interest rates needed to contain inflation.

Excerpt from:

Russia proposes ban on use and mining of cryptocurrencies - CNBC

Read More..

What is a Cloud Server? | VMware Glossary

Companies large and small have multiple options when it comes to choosing the right cloud server option. The best cloud servers are optimized for specific needs and budgets. What works for a global enterprise might not be right for a mid-market company.

Cloud servers can be deployed in three primary types of clouds:

Public cloud: Cloud servers are most commonly deployed via the public cloud. In this scenario, a third-party provider owns and manages the servers and other infrastructure, and gives its customers access to on-demand computing services.

Private cloud: A company can host its own cloud servers privately and maintain control of their management and maintenance. These server resources are not shared with other organizations, but since they are in the cloud, they can be accessed remotely by any employee, typically through a company intranet or VPN.

Hybrid cloud: Public and private clouds can be combined with on-premises cloud servers and off-site cloud servers working together. This hybrid cloud environment gives companies more options and flexibility to maintain control and security when necessary. It also leverages public clouds when they must quickly expand to meet surges in demand.

Excerpt from:
What is a Cloud Server? | VMware Glossary

Read More..