OpenShift 4.21 launches with unified platform for AI and modern apps
Wednesday, February 11, 2026 by Brittany Hainzinger
Red Hat OpenShift 4.21 is now generally available, based on Kubernetes 1.34 and CRI-O 1.34. This release focuses on unifying AI training, containerized microservices, and virtualized applications on a single operational model to reduce costs and eliminate infrastructure silos.
Accelerated AI innovation
Streamlined training: Data scientists can use a sing...
Reused bitcoin addresses are quietly increasing quantum risk
Wednesday, February 4, 2026 by Brittany Hainzinger
Despite billions spent on blockchain improvements and security measures, crypto criminals still steal billions of dollars from the crypto ecosystem each year, and that didn`t change in 2025. In fact, with over $4 billion in total losses from hacks, fraud, scams, money laundering, and ransomware, 2025 was the worst year for crypto illicit activity ever recorded.
Howev...
AI generated scams and phishing in 2026
Monday, January 5, 2026 by Austin Harris
David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for us in the way of AI scams.
By 2026, AI-generated scams and phishing will be virtually indistinguishable from legitimate apps, storefronts, and communications making detection alone unreliable. App developers will need to design for breach resilience using MFA, passkeys, AI-driven se...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
CoinDCX launches bounty after security breach
Friday, August 1, 2025 by Richard Harris
CoinDCX, one of the largest cryptocurrency exchanges in India, has issued an official statement following a sophisticated security incident on July 19, 2025, which affected one of its internal operational accounts used solely for liquidity provisioning on a partner exchange. The company emphasized that no customer funds were impacted and that all assets remain secure in...
McDonalds AI Hiring Bot Breach
Thursday, July 17, 2025 by Russ Scritchfield
Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue.
In a supers...
Stolen funds recovered by Binance
Thursday, August 29, 2024 by Russ Scritchfield
Binance, the leading blockchain ecosystem behind the world's largest crypto exchange by trading volume, is proud to share that its security team has recovered or otherwise frozen over $73 million in user funds from external hacks as of July 31 this year. This surpasses the approximately $55 million secured throughout 2023.
Over $73M in stolen funds recovered by B...
Tom Brady NFT sale sparks warning to consumers from experts
Wednesday, February 28, 2024 by Austin Harris
An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year.
The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...
Mobile cramming scheme halted by FTC
Thursday, November 30, 2023 by Richard Harris
The Federal Trade Commission has obtained orders with the four remaining individual defendants and their affiliated companies in a mobile cramming scheme that the agency says bilked consumers out of more than $100 million through bogus charges added to their mobile phone bills.
The proposed settlements with Darcy Michael Wedd and Phwoar, LLC.; Fraser Robert Thompson ...
Fake app reviews impact developers more than you think
Thursday, June 29, 2023 by Austin Harris
Developers are well aware that a significant portion of online reviews for products and services, including those on popular platforms like Amazon, eBay, and TripAdvisor, are in fact fake. The issue of fake app reviews has become an increasingly pressing concern. These deceptive reviews have wide effects on both developers and consumers alike, significantly impacting th...
Warning to app developers from dating app founder
Thursday, May 25, 2023 by Austin Harris
Leading consensual non-monogamy (CNM) app 3Fun, is the victim of an attempted trademark infringement extortion plot that has included the temporary removal of the app from the iOS App Store. This unexpected disruption has greatly impacted 3Fun's business, as it loses new and current iOS users and risks losing its high ranking in the App Store.
The extortion plot ...
Over 40 percent of DeFi token pairs may be fraudulent
Tuesday, December 27, 2022 by Richard Harris
Rome Blockchain Labs (RBL) has released new research showing that many token pairs on decentralized exchanges (DEXs) may be fraudulent or duplicates. Using its data service, RBL Net, the team analyzed data on over 1,000,000 pairs on Uniswap (ETH) and PancakeSwap (BNB).
In light of the many marketplace crashes and burgeoning fear in the marketplace, due to scandals li...
IP blocking warning when preventing click fraud
Friday, July 29, 2022 by Austin Harris
Click fraud is a massive problem, stealing tens of billions of dollars from advertisers every year. The fraudsters responsible for this crime include technically savvy website owners, transnational organized crime gangs, and even Nasdaq-listed multinationals.
The scam works like this: criminals create websites, and contact advertising networks like Microsoft Ads to r...
How to join the metaverse
Tuesday, July 12, 2022 by Richard Harris
When Facebook renamed itself, Meta, last fall, it inadvertently shined a spotlight on the metaverse. Everyone, including established clothing brands, celebrities, and pro sports teams wanted (and still very much does) a piece of this new universe. The question is how. How can businesses create sustainable strategies for their existence in this new realm that will last b...
Will The Metaverse bubble will burst
Monday, May 9, 2022 by Austin Harris
"The meta-bubble is set to burst, with a bang. There are an astonishing 160 companies currently building their own metaverses. This is an unbelievable amount of time and money pouring into unchartered territory," says Tim Frost, founder, and CEO of Yield App.
"The metaverse looks set to be the next big stage on which we will see crippling los...
HitPiece facing legal action from RIAA
Wednesday, February 9, 2022 by Richard Harris
The Recording Industry Association of America (RIAA) sent a demand letter to the attorney representing the notorious (and now offline) NFT scam site HitPiece.com and its founders demanding the site stop infringing music creator Intellectual Property (IP) rights, provide a complete listing of site activities and revenues to date and account for all NFTs and artwork ...
Automatic MetaMask configuration comes to Umbria Network
Thursday, December 9, 2021 by Austin Harris
Umbria Network, a project, which has Online Blockchain plc as its co-ordinator, administrator, and advisor is further trying to simplify DeFi with its Connect Portal.
The tool enables anyone in the crypto community to automatically connect a MetaMask wallet to any Ethereum-style/EVM compatible chain, such as Polygon, Binance Smart Chain, Ethereum, and Avalanche almos...
Persistent memory makes its way into business applications
Tuesday, January 12, 2021 by Richard Harris
In 2021, more businesses will focus on rapidly accelerating and scaling out applications to meet the challenges of digital transformation.
In 2020, the COVID-19 pandemic drove many businesses, especially those in food delivery, eCommerce, logistics, and remote access and collaboration services, to dramatically scale-out and upgrade infrastructure to maintain high app...
Decentralized technologies solve Illiquidity problems
Tuesday, December 17, 2019 by Richard Harris
Illiquidity is one of the major factors affecting global financial markets. Digitizing new assets and finding corresponding buyers and sellers is difficult and costly. Much has been said about the potential for decentralized technologies to solve these problems, but current offerings fundamentally lack the necessary performance guarantees, feature set, and architectural...
Match.com gets sued by FTC for using fake love interest ads
Thursday, September 26, 2019 by Austin Harris
This just in from the FTC. The Federal Trade Commission has sued online dating service Match Group, Inc. (Match), the owner of Match.com, Tinder, OkCupid, PlentyOfFish, and other dating sites, alleging that the company used fake love interest advertisements to trick hundreds of thousands of consumers into purchasing paid subscriptions on Match.com.
The agency also al...
Blockstack becomes SECqualified token offering
Friday, July 12, 2019 by Austin Harris
Blockstack PBC is officially the first company in U.S. history to receive SEC qualification for its digital token offering. Under the SEC Regulation A+ framework, Blockstack will conduct a $28 million cash offer that is accessible to any purchaser who would like to take part in the future of decentralized computing – from general enthusiasts to longstanding Blocks...
Dapps compared to apps
Monday, February 4, 2019 by Richard Harris
Dapps, or "decentralized app" development is still in the gestational stage, but one company has seen growth spurts in the number of active dapps throughout 2018. Dapp.com recently compiled their latest quarterly report providing a snapshot of what's happening in the market
Some key takeaways from their report included:
Over 900 dapps had la...
Top ten ICO scams that swindled over $687M
Friday, September 28, 2018 by Richard Harris
Initial Coin Offerings are one of the most tempting investment options for those hoping to profit from the ever-evolving world of cryptocurrency. However, the lack of regulation has allowed ICO investors to become targets of sneaky schemes.
Though ICOs have snowballed, with more than 750 being invested in during 2018 alone, the number of scams has also steadily risen...
30,000 blacklisted apps hosted on the Google Play Store report finds
Friday, September 21, 2018 by Richard Harris
RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors.
For the second year in a row, RiskIQ observed a sharp increase in black...
The issues with Blockchain and the enterprise
Thursday, May 3, 2018 by Mike Palencia
At the end of January 2018, the total market cap of the crypto-economy stood at over $500 billion. This phenomenon is occurring at a time when the vast majority of individuals involved in this space are just trading cryptocurrencies and where even that user base is not particularly big.Some people interpret these facts as a sign that this is a bubble waiting to burst. O...
ICO investment guide to review before you leap
Wednesday, February 21, 2018 by Harrison Gross
When reviewing a new cryptocurrency project or vendor, there is a certain amount of due diligence required. The crypto space is notorious for an abundance of charlatans, phishers and scammers which seem to only get more sophisticated and verisimilar by the day. Here is a quick checklist to run through when approaching or being approached by a party or project in crypto....
Bitcoin exchange apps are risky claims new report
Monday, January 29, 2018 by Austin Harris
RiskIQ claims that the app stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers. They analyzed 18,408 apps across 20 app stores (mostly Android based), but including Apple, Google Play, SameAPK, and APKPlz.Fabian Libeau, EMEA VP of RiskIQ, warned anybody considering downloading such software to be extremely cautious and to research eac...
How to protect IP communications from telecom fraud
Thursday, December 28, 2017 by William King
Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...
The hottest skills needed in the freelance job market to get hired
Thursday, May 4, 2017 by Richard Harris
Upwork has released its newest quarterly index of the hottest skills in the U.S. freelance job market. The Upwork Skills Index ranks the site’s 20 fastest-growing skills and is part of a quarterly series that sheds light on new and emerging skills freelancers are providing. According to a recent report, nearly half (49%) of hiring managers use freelancers to access skil...
NoTrove threat is delivering millions of scam ads
Friday, April 28, 2017 by Richard Harris
Earlier this year, RiskIQ, a digital threat management company, reported an eight-fold increase in internet scam incidents that deny the $83 billion digital advertising industry millions of dollars. Now, researchers at RiskIQ have identified NoTrove, a newly discovered and major threat actor that is delivering millions of scam ads that threaten consumers and further und...
Ways you can protect yourself on the Internet
Thursday, February 23, 2017 by Richard Harris
Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Austin Harris
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
Five indispensable tools for your agile projects
Sunday, December 18, 2016 by Richard Harris
Agile project management methodologies have become increasingly popular for software development—especially among development teams making video games. Perhaps developers are attracted by the cool name which brings to mind animators and game designers in ninja outfits nimbly scampering over once insurmountable project deadlines. Or maybe it resonates with programmers wh...
The impact of fake retail apps hitting the Apple App Store this year
Tuesday, November 8, 2016 by Austin Harris
Holiday retail woes have hit a little early this year, with hundreds of fake retail and product apps appearing in Apple’s App Store recently. The New York Times reports counterfeiters have disguised apps as retail chains like Dollar Tree and Foot Locker, department stores like Nordstrom and even luxury brands like Jimmy Choo. With Apple known to have a st...
New Report Highlights Wide Ranging Cybersecurity Challenges
Wednesday, September 2, 2015 by Richard Harris
Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...