Author Archives: Mark Abssy

Qualcomm targets 5G infrastructure market with base station chips

Qualcomm targets 5G infrastructure market with base station chips

Long time communication chip maker looks to move upstream in digital infrastructure push.

Qualcomm Inc on Tuesday said it will produce chips for 5G telecommunications networking gear, marking the first entry by a major American technology company into a market dominated by European and Chinese firms.

Source: Qualcomm jumps into 5G infrastructure market with base station chips

Impossible Foods Seeking World’s Best Scientists

Impossible Foods Seeking World’s Best Scientists

Not content to simply offer alternatives to beef production and consumption, Impossible Foods announces goal to “Eliminate Animal Agriculture”

With a mission to reverse global warming and halt catastrophic biodiversity collapse, Impossible Foods is replacing the world’s most destructive technology – the use of animals to transform plants into meat, fish and dairy foods.

Source: Impossible Foods Is Doubling Its R&D Team and Seeking World’s Best Scientists To Help Eliminate Animal Agriculture

Washington State’s Agencies Identified as Cyber Attack Target

Washington State’s Agencies Identified as Cyber Attack Target

In a targeted phishing attack it appears hackers have manged to deploy two known pieces of malware that have proliferated throughout several state agencies. DHS, FBI and MSFT are investigating.

Hackers have launched a sprawling, multifaceted cyber-attack against the state of Washington, according to two people familiar with the matter.

Source: Hackers Have Infiltrated Many of Washington State’s Agencies – Bloomberg

SIM Cards – Not Just for Network Identification Anymore…

SIM Cards – Not Just for Network Identification Anymore…

Phone number spoofing has always been a pain. New technology ups hackers social engineering game and forces all of us to be ever more vigilant – like tinfoil hat-wearing vigilant…

Little-discussed types of SIM cards make it easy for hackers to spoof any phone number or completely change a user’s voice.

Source: These Illicit SIM Cards Are Making Hacks Like Twitter’s Easier – CoinDesk

Intel Consultant Leaks 20GB Proprietary Data 

Intel Consultant Leaks 20GB Proprietary Data 

In a big twist, the world gets to see what’s “Inside Intel” as a giant hack flips the company’s motto on its head.

Switzerland-based IT consultant Tillie Kottmann on Thursday published a trove of confidential Intel technical material, code, and documents related to various processors and chipsets.

Source: Intel NDA blueprints – 20GB of source code, schematics, specs, docs – spill onto web from partners-only vault

Old Problems, New Technology: Cybersecurity Today and the Companies Leading the Way

Old Problems, New Technology: Cybersecurity Today and the Companies Leading the Way

The term “cybersecurity” often brings to mind images of either a nefarious looking hooded computer nerd superimposed over floating dollar signs or a picture of a shiny lock superimposed over a background of floating binary numbers – imposing and futuristic stuff! 

While we are all enamored with the newest and shiniest things, let’s not forget that current cybersecurity technology is just another step in the evolution of protecting communications and data storage. Securing information and verifying identity are millennia-old processes that started with trusted couriers and clay seals. Today’s trusted couriers come in the form of digital identity verification, with clay seals in the form of 256 bit (and higher) encryption. In addition to this framework are the secure message pathways in the form of what is known as “end-to-end” encryption, which not only wraps each message in encryption but provides a fortified route in between any and all participants. 

At a high level, the basic approach to message security hasn’t changed over thousands of years. Long ago, anyone looking to disrupt secure communication could do so by either corrupting the messenger or capturing the message en route and modifying or replacing the message contents altogether. When we look at how this can happen today, the basic approach is the same but the methods have once again evolved. 

Let’s take a look at how hackers can compromise your communications and data – the “attack vectors.”

READ MORE HERE

A Blockchain Primer: What Is It, Who’s Using It, When It’ll Go Mainstream, And How To Invest In It

A Blockchain Primer: What Is It, Who’s Using It, When It’ll Go Mainstream, And How To Invest In It

In 2008, a whitepaper was written by Satoshi Nakamoto (whoever he, she, or they may be), which ultimately introduced Bitcoin to the world. But as much as Bitcoin is truly revolutionary, it stands on the shoulders of a number of papers authored by Scott Stornetta and Stuart Haber in the early 1990s that outlined ways to digitally serialize, timestamp and protect transactions through a distributed, or decentralized, database. These papers effectively outline the framework for what has become known as blockchain technology. We’ve seen several ETFs come to market looking to capitalize on the explosive growth and disruption associated with blockchain and more than a few companies pivot their business models to capitalize on it as well.

But first, we’ll give you a quick primer on blockchain, as well as some real-life examples, before getting into mainstream adoption and ways to invest in it.

READ MORE HERE

An Investor’s Primer on Virtual Reality (VR) and Augmented Reality (AR)

An Investor’s Primer on Virtual Reality (VR) and Augmented Reality (AR)

Just as the internet has changed how we can communicate, transact, consume, and produce, so will Augmented Reality (AR) and Virtual Reality (VR) improve, and in some respects, utterly transform our lives.

Source: An Investor’s Primer on Virtual Reality (VR) and Augmented Reality (AR) | Nasdaq