Mobile Trading Apps Found Vulnerable to Hacking

Security vendor IOActive recently tested 21 of the most popular mobile trading applications and found that the majority of them exposed users to a range of security risks. These apps allow users to buy and sell stocks, fund accounts, keep track of equity and available buying power, and create alerts … Read More

Your Smartphone Might Start Scanning Your Heart

Just in case you thought you read that wrong, yes, your beating heart could become a password. How? Now that researchers have begun implementing facial recognition systems in common tools such as smart phones, they are looking for even better ways to improve. A group of computer scientists at the … Read More

SEC Vulnerability May Be Responsible for Insider Trading

The Securities and Exchange Commission has been a leader and enforcer of cybersecurity requirements. However, even the SEC is vulnerable as they recently announced a 2016 data breach that might have given hackers access to private information that could easily have been used for illegal trading. SEC Chairman Jay Clayton … Read More

How Apple Is Changing the Security Game

With the announcement of the new iPhone X came a surprising new security feature: facial recognition. Introduced as Face ID, the new form of biometric authentication is far more secure than other facial recognition systems on the market as well as Apple’s own fingerprint identification Touch ID. Face ID is … Read More

Tor: The Green Tops

The future of Tor largely depends on the community; as the number of nodes on the Tor network increases, the security for the entire network increases.  The project site lists a call to action that requests users to consider running a node or volunteering as a developer. There are three kinds … Read More

Tor: The Bulb

To better understand Tor, it is useful to understand how internet traffic is processed. The following image depicts normal internet traffic, without any protections.  When a person accesses a website, that person’s computer sends packets of information to the website that contain information like who the person is, where the … Read More

Tor: The Roots

Tor, the onion router, was developed by the U.S. Naval Research Lab and DARPA; version 2 was released to the public in 2004 after which the Electronic Frontier Foundation, a nonprofit centered on defending digital privacy rights, began funding the developers to continue their work on Tor. Two years later, … Read More

An Introduction to Cryptocurrency

Cryptocurrency is poised to revolutionize modern monetary practices, allowing for a universal form of exchange. At some point in the past, a decentralized system of exchange was just a musing relegated to forums populated by a handful of cryptographers; then, in 2008, some messages appeared in a cryptography forum claiming … Read More

Bitcoin’s Blockchain: The Distributed Ledger of Bitcoins

The previous article provided an introduction to Cryptocurrency, as well as an outline of the current monetary exchange system. The bitcoin currency has a similar exchange system, referred to as Bitcoin, as that of physical currency, but there are some key differences to note.  The central reserve bank providing various … Read More

Anonymity and Cryptofraud on the Blockchain

Bitcoin enables anonymous transactions between a sender and a receiver by allowing each one to know only the public key. The possibility of working backwards from a public key to a private key, in an attempt to access someone else’s digital signature and sign transactions as the private key holder, … Read More