CRIP.TO
Read the Latest News and stay updated regarding Cybersecurity,
Encryption, Privacy, Safe solution to communicate across Internet.

There’s an old saying generally used to say someone is special. That saying is, “You’re one in a million.” Sounds rather sentimental and sweet, doesn’t it? However, when it comes to data breaches, being one in however many have been stolen is not at all sentimental. It is unsettling and can lead to identity theft.

The new Coinmine One Rig

In the early days of cryptocurrencies, a person could mine to their heart’s content with a basic laptop. Boy, has that changed. Today, a coin mining rig costs in the thousands; sucks electricity like a vampire in a feeding frenzy and generates tons of heat and noise. Coming from the electric utility business, I found the power appetite of these monsters appalling. One article reported 13% of all power use today is going to coin mining! 

Gone are the days of slipping your PC online to grab a bit of the gold rush, er, coin rush bounty. With one company even designing and selling self-contained mining operations in 40’ shipping containers. Just plunk

Apple users have long enjoyed a more secure position in the digital world. Since Apple had a substantially smaller share of the personal computing market, hacks of its products had seemed less profitable. Not there haven’t been bugs, viruses, hacks, and other nasty elements that inflicted damage on Apple users; therejust were not as many of them.

The bad actors are at it again, this time taking their phishing schemes to text messages. Just this week, I received my first two. And just this week, Digital trends posted an article about this very subject. It seems that the decline in using traditional email in favor of cell phone alternatives is cutting into the bad guys’ revenue. So, they have taken their black arts to text messages.

 The American National Security Agency (NSA) apparently will be offering one of its specially developed cybersecurity tools to anyone with interest. Named GHIDRA, it is a reverse engineering tool. According to an articlein the Hacker News, the NSA is planning to release it at the RSA security conference in March.

 

We’ve written before about the value of personal data, both to legitimate and illegitimate entities. In an article on PCMag.com, Max Eddy lays out the various ways in which legitimate companies make money on all of us.

 

Everyone likes to have a fall guy or gal when something goes wrong. “Hey, that’s not my fault, I couldn’t help it that this person did that.” It seemslike this is especially true when there is a data breach that makes the headlines.

Do You Have a Tip or a suggestion for an interesting topic? Tell Us About It.

About CRIP.TO

We envision a world where all digital communications are safe and private. We are dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Stay Updated

Enter your e-mail and we will keep you updated with our latest news.

Am I a Robot?