Government and industry push bitcoin regulation to fight ransomware

Government and industry officials confronting an epidemic of ransomware, where hackers freeze the computers of a target and demand a payoff, are zeroing in on cryptocurrency regulation as the key to combating the scourge, sources familiar with the work of a public-private task force said.

In a report on Thursday, the panel of experts is expected to call for far more aggressive tracking of bitcoin and other cryptocurrencies. While those have won greater acceptance among investors over the past year, they remain the lifeblood of ransomware operators and other criminals who face little risk of prosecution in much of the world.

Ransomware gangs collected almost $350 million last year, up threefold from 2019, two members of the task force wrote this week. Companies, government agencies, hospitals and school systems are among the victims of ransomware groups, some of which U.S. officials say have friendly relations with nation-states including North Korea and Russia.

“There’s a lot more that can be done to constrain the abuse of these pretty amazing technologies,” said Philip Reiner, chief executive of the Institute for Security and Technology, who led the Ransomware Task Force. He declined to comment on the report before its release.

Just a week ago, the U.S. Department of Justice established a government group on ransomware. Central bank regulators and financial crime investigators worldwide are also debating if and how cryptocurrencies should be regulated.

The new rules proposed by the public-private panel, some of which would need Congressional action, are mostly aimed at piercing the anonymity of cryptocurrency transactions, the sources said. If implemented, they could temper enthusiasm among those who see the cryptocurrencies as a refuge from national monetary policies and government oversight of individuals’ financial activities, having surged past $1 trillion in total capitalization.

The task force included representatives from the FBI and the United States Secret Service as well as major tech and security companies. It will recommend steps such as extending “know-your-customer” regulations to currency exchanges; imposing tougher licensing requirements for those processing…


Global Mobile Threat Management Security Software Market 2021 Industry Development – IBM Corporation, Cisco Systems, Microsoft Corporation

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.

Top 7 Mobile Security Threats in 2020 | KasperskyGlobal Mobile Threat Management Security Software Market 2021 by Company, Regions, Type and Application, Forecast to 2026 comprises estimations of the growth rate and the market value based on market dynamics and growth-inducing factors. The report is complete with elaborate research undertaken by prominent analysts and a detailed analysis of the global industry place. The report has precisely studied most areas of market analysis such as market definition, market segmentation, competitive analysis, and research methodology. The research contains well-elaborated, extensive scrutiny of this global Mobile Threat Management Security Software industry alongside major parameters that may most likely influence the market commercialization matrix. While generating this market research report, customer satisfaction is kept on the utmost priority.

The report provides a list of key competitors with the required specifications and also provides strategic insights and analysis of the key factors influencing the industry. It also studies company profiles with respect to a company snapshot, geographical presence, product portfolio, and recent developments. Here company profiles with respect to a company snapshot, geographical presence, product portfolio, and recent developments. This conceptual analysis of the global Mobile Threat Management Security Software market presents market products, application wise segmentation, comprehensible study, and pin point analysis for changing competitive dynamics. This information will help players at every critical stage ranging from raw material resourcing to establishing a global presence.


NOTE: COVID-19 has had a major impact on the world economy in addition to that on the public health. This particular pandemic had caused severe economic destruction and not a single country has been left unaffected. The virus has forced businesses around the globe to change the way they operate. This report gives an analysis of the COVID-19 aftermath on Mobile Threat Management Security Software market.

List of players that are currently profiled in the report:

  • IBM…


What the Titans of Industry Reveal about SolarWinds Attack

It’s been approximately 100 days since the disclosure of the attack on the SolarWinds Orion platform, and we are in a better place to understand what happened.  It’s been pretty eye-opening to learn how ill-equipped prominent industry players, including cybersecurity experts, were when it came to finding, preventing and defending themselves against an attack like this. 

The CEOs from FireEye, Microsoft, SolarWinds, and CrowdStrike appeared in front of a U.S. Senate panel to layout the unfolding of events, defend their conduct in the data breach (blamed on Russian hackers) and sought to shift responsibility elsewhere.  Notably missing was Amazon, even though its AWS cloud platform was a contributing factor in how the cyber attack was executed and spread.

During the testimony, it was outlined how the SolarWinds software was hijacked and used to break into a host of other organizations, and that the hackers had been able to read Microsoft’s source code for user authentication.  This exposure and subsequent manipulation of the source code led to the hack of about 100 U.S. companies and nine federal agencies. CrowdStrike went so far as to say of Microsoft’s antiquated and complicated approaches – “The threat actor took advantage of systemic weaknesses in the Windows authentication architecture, allowing it to move laterally within the network” and that “if a different methodology had been used this particular threat vector would be eliminated.”

Even if the Senate panel pushed for a security solution for future prevention they wouldn’t have gotten one.  These organizations are too ingrained in what they know and the tools/systems they have designed, or use.  In this blog we’ll recount details of the hearing, but at the end, we’ll lay out why with our ARIA ADR solution, why the attack on Orion never would have happened; thus we would not have the cascading consequences that are coming to light in its wake.

Enjoy and see you at the end….


Your vendors and partners may be your biggest cybersecurity risk

The attack was discovered by FireEye and only by chance, as they noticed simultaneous log-ins. He spoke that his company had pen test tools stolen as a…


JZZ Technologies, Inc. Jumps into the Billion Dollar Prison Reform Industry by Training Ex-Offenders in IT & Cyber Security for Under $500

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

JZZ Technologies, Inc. and launches a Second Chance Program called

Calverton, New York–(Newsfile Corp. – March 29, 2021) – JZZ Technologies, Inc. (OTC Pink: JZZI) has partnered with to launch a new program to help train Returning Citizens (ex-felons) in the IT Network Security and Cyber Security industries.

According to the United Nation’s office on Drugs and Crime, imprisonment disproportionately affects individuals and families living in poverty. When an income generating member of the family is imprisoned, the rest of the family must adjust to the loss of the income exacerbated by the new expenses that must be met, such as legal costs and transport to prison for visits, etc.

When released, often with no prospects for employments, former prisoners are generally subject to socio-economic exclusion and are vulnerable to an endless cycle of poverty, marginalization, criminality and imprisonment. Thus, imprisonment contributes directly to the impoverishment of the prisoner, of his family (with a significant cross-generational effect) and of society by creating future victims and reducing future potential economic performance (United Nation’s Office on Drugs and Crime, 2020).

“As an ex-hacker with over 35 years’ experience in computer securities as well as training state and federal law enforcement, I have always believed that a reformed ex-offender who is trained in network security will be stronger in protecting networks from being hacked than someone that has no understanding of both the legal and illegal side of network security. That’s because the bad guy knows how to think like a hacker,” says Gregory Evans.

“A major reason that big corporations and governments get hacked every day is because they hire IT teams based on individuals’ certification, not necessarily their experience. A person in network securities who has never had a parking ticket, let alone hacked into a network before, is less likely to understand the complexities of network securities from the perspective of someone who is practiced in finding ways around those security measures. A person who does not…