What is blockchain

What is blockchain?

What is blockchain?

Blockchain is one the mostly used buzz now a days in the world of technology and everyone want to know what is blockchain and how it works?

Blockchain is a decentralized (not controlled by central authority), distributed database, which maintains a continuously growling list of records that is called block. Each block can represent a various transactional record and the chain can link them together using a hashing function.

The blockchain concept was introduced in 2008 by Satoshi Nakamoto. Satoshi Nakamoto is the name used by unknown group of people or person who described a pure peer-to-peer version of electronic cash system known as Bitcoin and the blockchain technology make its debut publicly. The blockchain was invented first by digital currency (Bitcoin).

The whole blockchain is stored on the large network of computers, meaning to say that not a single person or authority has control over its history.

How does this work?

Hundreds of computer around the world are connected to the blockchain and each of one of them holds a copy of Blockchain history record.

What is Social Engineering

What is Social Engineering?

What is Social Engineering?

Social engineering is the art of tricking the users into security mistakes so they give away the confidential information. The type’s information that hackers are looking for can be different, but when individuals are under attack, the hackers are usual want to trick them to get their passwords, bank information or installing malicious software into their computer.

If you ask any Security Professional about who can be a good target for hacking, you get the answer HUMANS, because humans are considered to be the weakest link and they can always be manipulate into doing some staff to open the gate for the hackers.

For Example if you put locks and deadbolt on your door and windows or if you have guards, alarm system and security cameras; if you trust the person at the gate who is claiming that he is the pizza delivery guy and you let him enter your home without proper check this is where you completed exposed to whatever risk he represents.

Types of social engineering attacks?

Phishing Attempts: The most common social engineering attacks come from phishing.In this type of attack, hackers will try to send messages via email, Instant message, comments in your social network post or even send you SMS claiming that this is from a famous business, bank, school, university in order to get your user and password or bank information.

The message can have these stories:

  • The message will can have there is a problem into your account click the link to solve your account problem and then they will ask your account credentials.
  • The messages may also contain that you won a lottery.
  • The message can also ask for help or charity.
  • You will receive a phone call that you won 1 million Afs and asked you to send a top-up of 500-1000 afs in order to transfer that amount.

Ransomware in Phishing: In the recent years, we have witnessed a rapid usage of ransomware along with phishing email. They send you an attachment such as URGENT ACCOUNT INFO with the file extension of .pdf.zip or pdf.rar, when you open the file then the attacker will encrypts your entire hard disk or specific folder and then ask you a bitcoin payment in order to unlock, after receiving the payment, they will decrypt your hard drive or folder.

Baiting: Baiting attacks involve offering victims something they like want. These type of attacks often appears in peer-to-peer sharing sites where you can download (Hot movies, celebrities’ pictures or pirate Hollywood or Bollywood movies etc.). When you click on the download button you may be downloading malware instead of, or in addition to, the files you actually want.

Quid Pro Quo: Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login credentials in exchange for a service. For example, an end user might receive a phone call from the hacker who, posed as a technology expert, offers free IT assistance or technology improvements in exchange for login credentials.

How to Prevent Social Engineering:

  • Do not open emails and attachments from suspicious sources – if you do not know the email sender or even if you know the sender and their emails looks suspicious never open email or attachment.
  • Always update your anti-virus/antimalware software – Turn your anti-virus/antimalware automatic update on.
  • Set your spam filters to high – Every email software has spam filter option always make a habit of setting the spam filter to high.
  • Perform a regular backup to an external medium (external hard drive or the cloud). After backing up, disconnect your drive. Current ransomware is known to encrypt your backup drive as well.
  • Phishing and baiting – these schemes mostly used in employment frauds targeting recent college graduates. Whether you are on social media, applying for jobs, always before you click, do your research, and visit HTTPS sites through a secure search engine, not via email or social media links.
  • Reject requests for help or offers of help – Legitimate companies and organizations do not contact you to provide help.
  • Delete any email, which asks for financial information or passwords – If you are asked to reply to a message with personal information, it is a fraud.
  • Beware of downloading files – If you receive an email and do not know the sender personally or you know the sender and your suspicious never make the mistake.
  • Humans need to be trained – Humans are the weakest link and Security Awareness Training programs are helpful to reduce the risk of being compromised and increase the level of awareness in the organization.
What is a quantum computer

What is a quantum computer?

A quantum computer harnesses some of the almost-mystical phenomena of quantum mechanics to deliver huge leaps forward in processing power. Quantum machines promise to outstrip even the most capable of today’s—and tomorrow’s—supercomputers.

They won’t wipe out conventional computers, though. Using a classical machine will still be the easiest and most economical solution for tackling most problems. But quantum computers promise to power exciting advances in various fields, from materials science to pharmaceuticals research. Companies are already experimenting with them to develop things like lighter and more powerful batteries for electric cars, and to help create novel drugs.

The secret to a quantum computer’s power lies in its ability to generate and manipulate quantum bits, or qubits. 

Where is a quantum computer likely to be most useful first?
One of the most promising applications of quantum computers is for simulating the behavior of matter down to the molecular level. Auto manufacturers like Volkswagen and Daimler are using quantum computers to simulate the chemical composition of electrical-vehicle batteries to help find new ways to improve their performance. And pharmaceutical companies are leveraging them to analyze and compare compounds that could lead to the creation of new drugs.

The machines are also great for optimization problems because they can crunch through vast numbers of potential solutions extremely fast. Airbus, for instance, is using them to help calculate the most fuel-efficient ascent and descent paths for aircraft. And Volkswagen has unveiled a service that calculates the optimal routes for buses and taxis in cities in order to minimize congestion. Some researchers also think the machines could be used to accelerate artificial intelligence.

It could take quite a few years for quantum computers to achieve their full potential. Universities and businesses working on them are facing a shortage of skilled researchers in the field—and a lack of suppliers of some key components. But if these exotic new computing machines live up to their promise, they could transform entire industries and turbocharge global innovation.