Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk!

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk!
by Matthew Rosenquist on 01-16-2020 at 6:00 am

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk

Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.

Banks are developing their own digital currencies. The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting trend that will change the cybersecurity dynamic for banking as it opens up an … Read More


Digital Retaliation of Iran – Top 6 Likely Cyber Attacks

Digital Retaliation of Iran – Top 6 Likely Cyber Attacks
by Matthew Rosenquist on 01-13-2020 at 10:00 am

Digital Retaliation of Iran – Top 6 Likely Cyberattacks

The United States and allies’ national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number of attacks against U.S. personnel and most recently the U.S. embassy in… Read More


Cryptocurrency Exchange Hacks are on the Rise

Cryptocurrency Exchange Hacks are on the Rise
by Matthew Rosenquist on 12-26-2019 at 10:00 am

Seven major cryptocurrency exchanges were victimized in 2019, totaling over $160 million in financial theft. As predicted, cybercriminal hackers targeted crypto exchanges in 2019 and the trend will continue into 2020.

Crypto exchanges are relatively new, as compared to those in the traditional financial markets. It is

Read More

Criminals Luring in Bitcoin Sellers to Launder Money

Criminals Luring in Bitcoin Sellers to Launder Money
by Matthew Rosenquist on 09-22-2019 at 10:00 am

Cybercriminals are luring in bitcoin holders with the promise of easy money if they become a mule to convert stolen assets into clean currency. The reality is these volunteers will just join the ranks of other victims. But that is not stopping people from joining up to replace other mules who have paid the price.

Criminals are selling… Read More


Major Drone Attack Against Global Oil Production Showcases Weak Cybersecurity Thinking

Major Drone Attack Against Global Oil Production Showcases Weak Cybersecurity Thinking
by Matthew Rosenquist on 09-17-2019 at 6:00 am

Drones attacked an oil processing facility last week and shut down half of all Saudi capacity, representing about 5% of the world’s daily oil production. We have seen how a botnet of compromised home appliances can take down a sizeable chunk of the internet, control structures of electricity and other critical infrastructures… Read More


NATO’s Collective Defense for Cyber Attack Remains Fragile

NATO’s Collective Defense for Cyber Attack Remains Fragile
by Matthew Rosenquist on 09-08-2019 at 3:00 pm

The Secretary-General of NATO, Jens Stoltenberg, stated all 29 member countries would respond to a serious cyberattack against any of the nations in the coalition. The pressing question is will NATO work together with combined forces when one of the members is attacked in an asymmetrical manner with digital technology?

When… Read More


Cryptocurrencies Should be Enabled to Blacklist Criminal Holdings

Cryptocurrencies Should be Enabled to Blacklist Criminal Holdings
by Matthew Rosenquist on 09-03-2019 at 6:00 am

Cryptocurrency is seen as a new, wild, reckless, revolutionary, and sometimes shady financial instrument. In addition to legitimate transactions, a disproportionate amount of attention is paid to the criminal use of cryptocurrency to store wealth, collect payments, transfer illicit funds, and launder money. Malicious

Read More

Banks and ATMs Under Cyber Attack

Banks and ATMs Under Cyber Attack
by Matthew Rosenquist on 07-06-2019 at 5:00 am

The Silence hacking crew, mostly attributed to a group of very crafty Russian hackers, has struck again pulling-in over $3 million in cash from ATMs.

At least 3 banks have been attacked in the latest campaign, with Dutch Bangla Bank being the largest. The criminal hackers first compromised the bank’s card management infrastructure… Read More


Google Trustworthy Response to Product Vulnerabilities Demonstrates Leadership

Google Trustworthy Response to Product Vulnerabilities Demonstrates Leadership
by Matthew Rosenquist on 06-16-2019 at 10:00 am

I applaud Google for taking extraordinary steps to protect and service their customers by offering free replacements for the Titan Bluetooth Security Keys. Such product recalls can be expensive, time consuming, and prolong negative stories in the news cycles, yet it is the right thing to do.

Many companies would choose instead

Read More

Will a Lack of Ethics Doom Artificial Intelligence

Will a Lack of Ethics Doom Artificial Intelligence
by Matthew Rosenquist on 05-31-2019 at 5:00 am

If there was ever a time that ethics should be formally applied to technology, it is with the emergence of Artificial Intelligence. Yet most of the big AI companies struggle with what should seem a simple task: defining ethics for the use of their products. Without the underpinnings of a moral backbone, powerful tools often become… Read More