Analysis | Does Bitcoin Boom Mean 'Better Gold' or Bigger Bubble? QuickTake - Washington Post
Analysis | Does Bitcoin Boom Mean 'Better Gold' or Bigger Bubble? QuickTake - Washington Post |
- Analysis | Does Bitcoin Boom Mean 'Better Gold' or Bigger Bubble? QuickTake - Washington Post
- AWS re:Invent 2020: AWS Community Builders Program Top Highlights - hackernoon.com
- How to maintain online payment security in your B2B portal - Finextra
- Pardon the Intrusion #33: SolarWinds unleashes a cyber storm - The Next Web
Posted: 20 Dec 2020 08:48 AM PST ![]() 1. What exactly is Bitcoin? It's a form of money that's remarkable for what it's not: It's not a currency you can hold in your hand. It's not issued or backed by a national government. At their core, Bitcoin and its imitators are sets of software protocols for generating digital tokens and for tracking transactions in a way that makes it hard to counterfeit or re-use tokens. A Bitcoin has value only to the extent that its users agree that it does. 2. Where did the Bitcoin system come from? The original software was laid out in a white paper in 2008 by a person or group of people using the pseudonym Satoshi Nakamoto, whose identity remains unknown, despite several efforts to assign or claim credit. Online fantasy games had long used virtual currencies. The key idea behind Bitcoin was the blockchain -- a publicly visible, largely anonymous online ledger that records Bitcoin transactions. 3. How does that work? Think about what happens if you make an online transfer using a bank. It verifies that you have the funds, subtracts that amount from one spot in a giant database it maintains of accounts and balances, and credits it in another. You can see the result if you log on to your account but the transaction is under the bank's control. You're trusting the bank to remove the right amount of money, and the bank is also making sure you can't spend that money again. The blockchain is a database that performs those tracking functions -- but without the bank or any other central authority. 4. Who performs the bank function for Bitcoin? It's done by consensus on a decentralized network. Bitcoin transactions can be made through sites offering electronic "wallets" that upload the data to the network. New transactions are bundled together into a batch and broadcast to the network for verification by so-called Bitcoin miners. 5. Who gets to be a miner? Anybody, so long as you have really fast computers, a lot of electricity and a desire to solve puzzles. The transaction data in each batch is encrypted by a formula that can be unlocked only through trial-and-error guessing on a massive scale. The miners put large-scale computing power to work as they compete to be the first to solve it. If a miner's answer is verified by others, the data is added to a linked chain of blocks of data and the miner is rewarded with newly issued Bitcoin. 6. How does the system prevent cheating? Because every block contains data linking to earlier blocks, an attempt to spend the same Bitcoin twice would mean revising many links in the chain. Plus, as miners compete, they verify each other's work each step of the way. 7. Who buys and uses Bitcoin? Bitcoin used to be the domain of Libertarians and drug dealers. Not any more. By now prominent money managers like Mike Novogratz and Alan Howard have invested hundreds of millions of dollars in Bitcoin and other cryptocurrencies. A survey Fidelity Investments conducted earlier this year found that 36% of institutional respondents held crypto in their portfolios. More than six out of 10 expressed interest in Bitcoin and other cryptocurrencies, up from fewer than half in 2019. Amid recent meteoric price appreciation -- Bitcoin has almost tripled in 2020 -- retail investors are getting in on the game, too, with many new users jumping into crypto this year. 8. Why is Bitcoin's price rallying like crazy this year? Long-time Bitcoin fans point to the so-called halvening that happened earlier this year, and cut in half the amount of new Bitcoins issued to miners for verifying transactions. Halvenings happen every three to four years. Because they limit the growth of Bitcoin, they are typically followed by rallies (often followed by deep crashes). At the same time, the entry of institutional investors, buying up hundreds of millions of the currency, has also pushed the price up. 9. What's the appeal for investors? Zero and negative yields on traditional assets are driving hedge funds and even companies like MicroStrategy to pour cash into Bitcoin, which while being highly volatile has appreciated substantially over the long term. While nay-sayers have long said that Bitcoin's value will go down to zero, many have recently had to revise their thinking -- simply because enough people seem to believe in Bitcoin. 10. Why is Bitcoin compared to gold? As a scarce resource, gold has traditionally been a hedge against inflation. Governments can speed up their treasuries' printing presses and thereby debase their currencies, but miners can't flood markets with gold, goes the thinking. Part of Bitcoin's appeal lies in the fact that it isn't controlled by governments or their monetary policies, and that its supply is limited even more strictly than gold's: halvenings help slow down the mining of new coins and production will cease entirely at 21 million coins. With the vast spending by governments and central banks in response to the pandemic raising fears of inflation after economies recover, more attention than ever is being paid to Bitcoin as "digital gold," even as inflation remains muted. 11. What's happening with institutional investors? They seem to be feeling more comfortable wading into Bitcoin in part because of better safeguards. The U.S. Treasury Department, for instance, has proposed requiring banks and other intermediaries to maintain records and submit reports to verify customer identities for certain cryptocurrency transactions. Over the past few years, Bitcoin has also developed a more substantial financial infrastructure. There are custody and trading services -- with proper licenses and credentials -- that cater specifically to the large regulated investors. 12. So is this another bubble, or is Bitcoin really digital gold? That's still unclear. As quickly as institutional investors got into it, they could get out of Bitcoin, pushing down prices dramatically: Bitcoin is still a thinly traded market, where so-called whales, controlling large quantities of coin, hold huge sway. In fact, ownership concentration in Bitcoin has increased during the latest rally, since July, with about 2% of anonymous accounts that can be tracked on the coin's digital ledger called blockchain controlling 95% of the available supply, according to researcher Flipside Crypto. A whale's exit -- a more likely event now that Bitcoin is the domain of not just believers but also pragmatic financiers -- can send ripples throughout the ecosystem, and pop the bubble. 13. Could another cryptocurrency supplant it? As the number of cryptocurrencies and tokens continues to multiply -- they now reach into the thousands -- Bitcoin remains the best-known, time-tested and valuable. It's also the one coin that's considered to be a potential store of value. Others, such as Ethereum, are used for other things, such as issuing tokens for use in decentralized finance applications. While a digital-gold alternative could yet emerge, it's increasingly looking unlikely. 14. How can I buy Bitcoin or invest in it? There are a bunch of ways, all with different risks. People can buy the coins directly from exchanges like Coinbase. Accredited investors can also invest in vehicles like the Bitcoin Investment Trust, which tracks Bitcoin's price. Now investors can buy or sell Bitcoin futures, and soon may be able to buy Bitcoin exchange-traded funds, once regulators feel comfortable with the idea. But be warned: Even plenty of people who believe in Bitcoin's future think some wild rides lie ahead. The big runup in Bitcoin's price back in 2017 was followed by an 83% rout that lasted a year. ©2020 Bloomberg L.P. |
AWS re:Invent 2020: AWS Community Builders Program Top Highlights - hackernoon.com Posted: 20 Dec 2020 02:02 AM PST ![]() ![]() @BrianHHoughBrian H. HoughBrand Strategist | Designer | Web Developer | Software Engineer | 4X Global Hackathon Winner Since becoming an AWS Community Builder on the Data, Databases & Analytics team this Fall, I have often explained the experience to friends, family, and colleagues as one of drinking water from a fire hose. I had known that cloud computing was rapidly transforming how we build, develop, and deploy software, but I did not know what this pace felt like at center of a company like Amazon Web Services. AWS' Community Builders program is fantastic for so many reasons, but specifically in how they offer technical resources, mentorship, networking opportunities, and exclusive trainings to a global team of AWS enthusiasts, emerging thought leaders, and developers. From learning about how to deploy AI/ML models in the cloud with SageMaker and DeepComposer, to securely encrypting and storing data in the cloud, this community continues to inspire and push each other to new heights. It might not be possible to learn everything, but we all certainly try as Community Builders 😊 Especially working from home and being remote, there's no better use of extra time than these types of "drinking water from a fire hose" experiences, such as going to AWS' re:Invent virtual conference this year. The entire programming was seamless and I was blown away but the ingenuity, precision, and organization that went into planning the conference. The AWS team and their sponsored partners have done a standout job of making the virtual experience welcoming, collaborative, and interactive — something that is quite hard to coordinate in a remote setting. I have received so much value from the sessions I attended over the past few weeks and I wanted to share the highlights for anyone who might be interested in learning more about devops, the cloud, serverless computation, and app development. Let me know what you think and learned about from these sessions! 👇 🌟 Building for the Future with AWS Databases Shawn Bice — Vice President, Databases, AWS Key lessons included:
🌟 Getting Started with AWS Identity Services Becky Weiss — Senior Principal Engineer, AWS Key lessons included:
🌟 How LEGO.com Accelerates Innovation with Serverless Sheen Brisals — AWS Serverless Hero & Senior Engineering Manager, The LEGO Group, AWS Key lessons included:
🌟 How Disney+ Scales Globally on Amazon DynamoDB Mark Roper — Senior Product Manager, DynamoDB, AWS
Key lessons included:
🌟 The Pragmatic Cloud Developer Colm MacCárthaigh — Senior Principal Engineer, AWS Key lessons included:
🌟 Using Amazon QLDB as a System-of-Trust Database for Core Business Apps Eric Kramer — Principal Product Manager, AWS Key lessons included:
🌟 AWS 2020 Modernization & DevOps Jam Hosted by Data Dog, VMware, and Netapp Key lessons included:
🌟 How Venmo Responded to the Demand for Contactless Payment on Amazon Aurora Nick Ciubotariu — CTO, Venmo Key lessons included:
🌟 AmazonDynamoDB Advanced Design Patterns Rick Houlihan — Senior Practice Manager, AWS DynamoDB Key lessons included:
🌟 Deep Dive on PostgreSQL Databases on Amazon RDS Jim Mlodgenski — Senior Database Engineer, AWS Key lessons included:
🌟 Building Post-Quantum Cryptography for the Cloud Alex Weibel — Senior Software Engineer, AWS Cryptography, AWS Key lessons included:
I'm curious to hear from others who attended re:Invent this year about what their favorite lessons learned were. From serverless app development to databases, AWS created multiple tracks to ensure that anyone, no matter their interests or backgrounds, could dive into the exciting world of serverless technology. Let me know below or at @BrianHHough on social media what you enjoyed most about the past few weeks at AWS' re:Invent conference! Originally published on the AWS Community Builders Blog
If you got value from this article, please LIKE 👏 and SHARE ↩️ this post with your network, as well as FOLLOW 📲 my Twitter, Instagram and LinkedIn accounts for further insights on technology, innovation, and our digital world. Also published on Dev.to TagsJoin Hacker Noon Create your free account to unlock your custom reading experience. |
How to maintain online payment security in your B2B portal - Finextra Posted: 20 Dec 2020 08:20 AM PST ![]() The modern business-to-business merchants are actively embracing online retail to step up their game. Relying on B2B portal development, they build solutions that bring together business customers from around the globe, supporting a convenient and personalized purchasing experience. On the downside, the shift to ecommerce aggravated the issue with payment security. Business-to-business transactions have always enticed the underworld, and digitization put these transactions within reach of adept cybercriminals. As a result, the B2B online payment fraud rate runs high: last year, 81% of organizations became targets of attempted or successful fraud attacks, as reported by the Association for Financial Professionals in the 2020 Payments Fraud and Control Survey. To get to the money or sensitive payment data, hackers leverage a wealth of attack techniques, from DDoS and malware to social engineering. They exploit vulnerabilities in web portal software, payment gateways, and networks or a lack of security awareness of transaction parties. In this article, we outline sustainable security measures to help you reinforce your B2B marketplace protection against the ever-evolving cyber-threats related to online payments. Refine identity and access management Identity and access management (IAM) is the baseline network and data security practice that many online business owners know and respect. However, hackers are finding increasingly more ways to bypass the common IAM mechanisms (role-based access, privileged accounts, and so on) with malware, metadata manipulation, or social engineering schemes. To thwart these attacks, B2B portal owners need to ramp up their IAM toolkit. Begin by shifting away from the insecure password-based authentication method to embrace the more advanced multi-factor authentication for customer account access. To reinforce access security in a mobile portal app version, you can turn to biometric authentication methods, such as fingerprint, voice or iris recognition. Advancing your identity verification mechanisms this way, you can prevent unauthorized access to your portal and ensure the legitimacy of every transaction. Conducting business online, a company has no physical opportunity to ascertain whether their counterpart is who they say they are. Cybercriminals often make use of this flaw, setting up fake accounts and masquerading as business owners to scam companies. To nip these fraud attempts in the bud, adopt the Know Your Customer procedure. KYC originated in the banking sphere and today is actively leveraged in ecommerce to confirm the company's identity before partnering with it. In the context of B2B ecommerce, the procedure involves the submission of documents and other types of information that confirm the customer's identity and solvency. Modern KYC solutions can streamline the identification process, automatically checking the submitted information against numerous publicly available databases. Set up ongoing activity monitoring Web portal activity tracking is widely considered an instrument belonging to the marketing toolkit, but its potential is broader than that. When applied for payment security reasons, activity monitoring mechanisms help detect upcoming security threats that can't be detected by antivirus or anti-malware tools. First and foremost, it is a good practice for security specialists to keep track of the day-to-day B2B portal performance via a web analytics tool. This will allow them to timely notice abnormal or suspicious user activity that may or may not be a security attack. Regular activity monitoring is particularly helpful for forestalling various types of DDoS attacks that aim to disrupt the portal traffic by flooding system bandwidth with multiple requests. Beyond that, companies that process credit card payments must track access to network resources and cardholder data under the PCI Data Security Standard. Due to the sheer volume and frequency of operations, this activity is commonly automated with an audit trail system. The software will log each customer's event and its type, time and date, whether the operation was successful, and other details. By reviewing the logs (the recommended frequency is once a day), the merchant can pinpoint unauthorized access attempts and other fraudulent activities and investigate them. Embed payment tokenization Credit card stealing malware is running wild on the internet. Typically, this malicious software injects itself or is injected by hackers into the retail portal source code and siphons off credit card data and other sensitive information. In the recent past, more than two million websites fell victim to the prolific Magecart spyware, with such high-profile merchants as British Airways and Ticketmaster among them. Even though the global business community is aware of Magecart, the spyware still manages to get past online merchants' defenses. The reasons for this differ from the rapid attack innovation to insufficient monitoring coverage, but one thing is clear: to stay on the safe side, you need to set up an additional level of protection over customer payment data. Tokenization, or the replacement of sensitive data with an algorithmically generated number called a token, has been recently gaining traction among online merchants, edging out encryption as a cost-efficient and secure option. Tokens are not the same as encoded payment card information; instead, it is a numeric map explaining the bank where the card owner's data is stored. During a tokenized transaction, the token is authorized in the credit card network and is matched to the customer's account number. After the bank allows the payment, the token is returned to the merchant for future transactions. Unlike the encrypted data, a token can't be mathematically reversed and is readable only by payment processors, meaning that hackers will have little use for it even if they somehow intercept the transaction. In addition to payment security, tokenization can also help lessen the burden of PCI DSS compliance and decrease the B2B portal security maintenance costs. Promote security awareness In the modern B2B ecommerce security landscape, social engineering scams proliferate along with technical attack strategies. Leveraging simple methods of psychological manipulation, criminals coax employees to perform certain actions or give away sensitive payment information about customers. This year saw an alarming rise in the business email compromise type of phishing attacks. Impersonating a company's CEO and other high-rank executives in correspondence, hackers persuade the respondent to transfer funds or pay a fake invoice. In the second quarter of 2020, the average cost of a successful BEC attack amounted to $80,183, according to the Anti-Phishing Working Group's Phishing Activity Trends Report. While anti-phishing software is the necessary protection measure for B2B portals, with the ongoing evolution of attack methods, it doesn't always provide full-scope security. This makes the promotion of security awareness among your staff and customers an indispensable accompanying measure. Corporate security training should be held regularly for employees at all levels, in order to educate them on current social engineering exploits, their mechanisms and consequences, and offer clear instructions on how to respond to such an attack. Since both transaction sides can fall victim to social engineering, the security awareness efforts should also extend to your partners, although the format of full-scale security training will not be appropriate in this case. Instead, you need to provide them with informative but unobtrusive educational resources, outline the advantages of investing in security monitoring tools, and inform timely of the relevant emerging attacks. Wrapping up The proliferation of payment fraud and security threats make the path to an efficient and reliable B2B portal thornier than ever. By combining tried-and-true practices with emerging technologies and security awareness promotion, a business can build a many-layered security strategy to navigate the modern threat landscape successfully and offer customers a safe experience.
|
Pardon the Intrusion #33: SolarWinds unleashes a cyber storm - The Next Web Posted: 20 Dec 2020 06:04 PM PST Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW's bi-weekly newsletter in which we explore the wild world of security. Earlier this week, several major US government agencies — including the Departments of Homeland Security, Commerce, Treasury, and State — discovered that their digital systems had been breached by hackers in what's fast turning out to be a highly sophisticated supply chain attack. Such attacks often work by first compromising a third-party vendor with a connection to the true target. Infiltrating a third-party provider that has access to their customers' networks also vastly increases the scale of an attack, as a successful break-in opens up access to all those businesses that rely on it, making them all vulnerable at once. In this case, the attackers turned out to SolarWinds, a Texas-based IT infrastructure provider, to inject malicious code into its monitoring tool that was then pushed to nearly 18,000 of its customers as software updates. ![]() SolarWinds counts several US federal agencies and Fortune 500 firms among its clients. According to cybersecurity firm FireEye, which also appears to have been a victim of the same attack, called it a meticulously planned espionage campaign that may have been ongoing at least since March 2020. Although there hasn't been any concrete evidence tying the attacks to a specific threat actor, multiple media reports have pinned the intrusions on APT29 (aka Cozy Bear), a hacker group associated with Russia's foreign intelligence service. It may take months to fully understand the breadth and depth of the hack, but the SolarWinds incident once again highlights the severe consequences of compromising a supply chain. Of course, supply chain attacks have happened before. What's more concerning here is how little has been done since then to prevent them from happening again. What's trending in security?Signal added support for encrypted group calls, the Zodiac Killer cipher was cracked after 51 long years, and a former Cisco engineer was sentenced to 24 months in prison for deleting 16,000 Webex accounts without authorization.
Data PointAccording to latest stats from the National Vulnerability Database, 2020 saw a record number of reported flaws, with as many as 17,537 bugs recorded during the year, slightly up from 17,306 in 2019. ![]() Over the past 12 months, 4,177 high-severity vulnerabilities, 10,767 medium-severity vulnerabilities, and 2,593 low-severity vulnerabilities were reported. In 2019, there were 17,306 flaws published: 4,337 high-severity, 10,956 medium-severity, and 2,013 low-severity vulnerabilities. That's it. See you all in two weeks. Stay safe! Ravie x TNW (ravie[at]thenextweb[dot]com) Read next: Christmas is better with Tom Vasel's YouTube board game reviews |
You are subscribed to email updates from "samsung galaxy s6 encryption,what does encrypting your phone do,database encryption" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Comments
Post a Comment