Page 2,581«..1020..2,5802,5812,5822,583..2,5902,600..»

New Rules Could Affect Robinhood and Bitcoin Traders. Here’s What You Need to Know – The Motley Fool

Trading cryptocurrencies has become increasingly popular, especially as a growing number of brokerage firms -- including platforms such as Robinhood -- have made it easier than ever to buy and sell virtual coins. But as cryptocurrencies have taken off as an asset of interest, regulators are also increasingly moving toward taking more control over this new market.

In fact, the Securities and Exchange Commission has made clear it is looking to take a firmer hand in imposing rules on cryptocurrencies -- which could have a profound impact on Bitcoin traders and those who buy other coins. And since much of Robinhood's business centers on crypto, the investment app could be affected as well.

Here's what you need to know.

Tips and tricks from the experts delivered straight to your inbox that could help you save thousands of dollars. Sign up now for free access to our Personal Finance Boot Camp.

By submitting your email address, you consent to us sending you money tips along with products and services that we think might interest you. You can unsubscribe at any time. Please read our Privacy Statement and Terms & Conditions.

Gary Gensler, the chairman of the Securities and Exchange Commission (SEC), has taken several steps recently that make clear the agency is increasing its focus on regulating cryptocurrency transactions.

In August, Gensler sent a letter to Senator Elizabeth Warren expressing the SEC's position that more resources and more legislation are both necessary and should be utilized to regulate all aspects of crypto trading, including investors, products, individual transactions, and cryptocurrency trading platforms.

"I believe we need additional authorities to prevent transactions, products, and platforms

from falling between regulatory cracks. We also need more resources to protect investors in this

growing and volatile sector," Gensler wrote. He also told Warren "The SEC has taken and will continue to take our authorities as far as they go," when it comes to policing the crypto market.

In September, in an exercise of this authority, the SEC threatened to sue Coinbase, a popular cryptocurrency trading platform that was about to launch a crypto-lending feature called Coinbase Lend. Whether or not the SEC has a case remains to be seen. But Coinbase has pulled the plug on its plans in response to the SEC's claims that the platform would traffic in unregulated securities.

And in a congressional hearing on September 14, Gensler's prepared remarks to Congress also made clear that the SEC is collaborating with other government agencies to more carefully monitor trading and lending platforms, token sales, custody of crypto derivatives, and other cryptocurrency related issues.

"We're working with not only the CFTC, but also the Federal Reserve, Department of Treasury, Office of the Comptroller of the Currency, and other members of the President's Working Group on Financial Markets on these matters," Gensler said.

This push on the part of the SEC has prompted some Republicans to express concern that the SEC may go too far and exceed its authority over regulations.

In fact, Senator Pat Toomey commented in response to Gensler's Tuesday comments, "I'm concerned that the SEC has not provided sufficient definition for and explained how it would apply the Howey test, which I think is the court standard for determining when something is an investment contract." That test was devised by the Supreme Court to establish when an asset is a security subject to SEC regulation.

For the many Americans who trade Bitcoin and other coins, watching the SEC for future developments could be crucial to understanding their ongoing rights and obligations when investing in virtual currencies.

Continue reading here:
New Rules Could Affect Robinhood and Bitcoin Traders. Here's What You Need to Know - The Motley Fool

Read More..

How to Use Twitter’s New Bitcoin Tipping Feature – Gadgets 360

Twitter recentlyreleased a new feature for users to tip their most favoured content creators using Bitcoin. Named Tips, the feature will allow Twitter influencers to earn money from anywhere in the worldwithout any geographical restrictions. Twitter has partnered with Strike, a platform built on Bitcoin Lightning Network, which can execute instant international payments at virtually no cost. Twitter has added a tiny money icon, whichif turned on,would appear on the creator's profile, informing others that Bitcoin tips were being accepted.

Here's what you need to do if you want to send tips to people via Twitter:

Sending tips via Twitter is pretty simple all you need to do is follow a few simple steps. Here's how you can send a Bitcoin tip via Twitter:

Download and sign-up on the Strike app. The app is available for download for Android, iOS as well as a browser extension.

Deposit the Bitcoin that you want to send to somebody as a Twitter tip in your non-custodial Strike wallet. Non-custodial wallets permit users to hold and own their private key while having full control of their funds. Keys are protected in encrypted storage.

Find your way back to Twitter and get to the Profile of whomever you wish to send the cryptocurrencytip to and tap the money icon that shows that the account holder is accepting Bitcoin tips.

Click on Next and if you wish, add a short message along with your tip. You can also proceed without having to addany message as well.

Now,select the open walletoption and you shall find yourself redirected to your non-custodial wallet, where you had first deposited your Bitcoin tip.

Click on confirm payment and just like that, the fund-loaded Bitcoin tip is instantly transferred to the other wallet.

The feature has first been rolled out foriOS usersand will gradually be released for Android users as well. For now, the functionality of Strike app is currently available in El Salvador as well as in a majority of regions in the US.

For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel.

Read the original post:
How to Use Twitter's New Bitcoin Tipping Feature - Gadgets 360

Read More..

Bitcoin: What I Hate, Love, and Fear About the Cryptocurrency – Gadgets 360

Bitcoin was born on 3rd January 2009, when her genesis block (block zero) was mined. The first transaction took place on 12th January between "Satoshi" and Hal Finney. Bitcoin's first "value" was set as 1309.03 bitcoins for $1. That's right, it was a fraction of a paisa! And now as she prepares to become a teenager, Bitcoin is valued at over $44,000 and has even become legal tender in one country! So what do I hate, love, and fear about Bitcoin?

In my personal opinion, Bitcoin is lousy as a medium of exchange. It is very volatile and suffers from slow transaction speeds. Compare it to UPI payments in India and Bitcoin seems like a cruel joke.

It makes no sense to use Bitcoin for payments in any country. There are so many better alternatives available in the crypto world. You could use dollar-pegged stablecoins. You could use hush/ privacy coins like Monero or you could use regular old coins like Litecoin. All of these are faster, cheaper, and less volatile.

The second thing I hate is the concept of HODLing holding on for dear life. There are so many memes about this that many people think it's actually a good investment strategy! The concept is that if you buy a little bit of Bitcoin and hold on to it forever, then you will become super-rich. I wish life were that easy.

This Internet meme shows what HODL really looks like

The third thing I hate is the concept of "buying the dip". This means that every time that Bitcoin prices dip, you buy more Bitcoin. This is an extension of HODLing. It means that you believe that Bitcoin prices will keep rising forever. So every time prices dip, you buy more.

'Buying the dip' is now being turned into memes

The fourth thing I hate is Bitcoin maximalists. They believe that Bitcoin is the only viable digital asset and all other cryptos are sh*tcoins. They are oblivious to the massive innovation being done by Ethereum, Cardano, Solana, Polkadot, Theta, Filecoin, and so many other awesome crypto projects.

In my personal opinion, Bitcoin is great as a store of value.

A store of value is an asset whose value either remains the same or increases over time. Some of the most popular stores of value are precious metals, real estate, treasury bills, and even art.

If Bitcoin becomes globally accepted as a store of value, then in my personal opinion, its total market cap would equal that of gold.

Depending upon your source of information, the market cap of all the gold in the world is between 8 to 10 trillion dollars. So the long-term marketcap of Bitcoin could be between $8 to 10 trillion.

Considering a maximum supply of 21 million bitcoins, I think a fair long-term price would be somewhere between $380,000 and $476,000. I expect to see this price by 2030 AD.

This is subject to two critical caveats the blockchain technology is not "broken" and no meteor crashes into our lovely planet 🙂

Bitcoin is totally dependent upon technology. If a major flaw is found and exploited, then Bitcoin will immediately lose its value and would crash to zero.

While blockchain is a robust technology, it has been hacked in the past on 15 August 2010 when a transaction created 184,467,440,737.09551616 Bitcoins.

That's more than 184 billion! Yes, you read that right. We all know that the total number of bitcoins that can ever exist is 21 million. But here we suddenly had hundreds of billions of bitcoins!

The problem was solved within a few hours. This "bad" transaction does not exist on the blockchain anymore. Neither do the billions of bitcoins created by the hackers. But 0.5 bitcoins that were consumed by the transaction still exist and are indelible proof of bitcoin's hack!

Can another successful hack take place? Of course, it can. And that's what I fear the most.

Rohas Nagpal is the author of the Future Money Playbook and Chief Blockchain Architect at the Wrapped Asset Project. He is also an amateur boxer and a retired hacker. You can follow him on LinkedIn.

Cryptocurrency is an unregulated digital currency, not a legal tender and subject to market risks. The information provided in the article is not intended to be and does not constitute financial advice, trading advice or any other advice or recommendation of any sort offered or endorsed by NDTV. NDTV shall not be responsible for any loss arising from any investment based on any perceived recommendation, forecast or any other information contained in the article.

Go here to read the rest:
Bitcoin: What I Hate, Love, and Fear About the Cryptocurrency - Gadgets 360

Read More..

New Zealand Launched Its First Bitcoin-Only Investment Fund – CryptoPotato

Vault International Bitcoin Fund became the first in New Zealand to be entirely focused on the primary cryptocurrency.

According to a recent local report, Vault Digital Funds provided New Zealand investors with a new fund called Vault International Bitcoin Fund.

Through it, they would have the opportunity to add the asset class to their portfolio without having to own it directly. Janine Grainger Co-Founder of Vault Digital Funds commented:

We see this as a great way for people to get that exposure without having to do all the more complicated and technical parts of it themselves.

She noted that the initiative would have a somewhat different focus than most traditional investment funds. It would be appropriate for people with an investment plan of more than ten years.

Nonetheless, Vinnie Gardiner Chief Executive and Co-Founder of Vault Digital Funds warned people dealing with cryptocurrencies about the risks in the field:

Bitcoin isnt appropriate for everyone. This is something that people should not be taking lightly.

Darcy Ungaro host of the NZ Everyday Investor and authorized financial advisor also gave his two cents on the move. He noted that despite the assumptions that bitcoin is a scam or a fad, locals have been showing a growing appetite for cryptocurrencies recently:

Over the past three years, I have been having conversations where people say bitcoin is a scam, or a fad, something to be avoided. But recently I have been helping more and more people allocate a portion of their portfolio towards it.

In fact, the most considerable risk is not whether bitcoin is a scam but how people hold and store their crypto holdings. Ungaro raised hopes that the Vault International Bitcoin Fund would grant investors with the necessary level of security because it takes care of all the custody issues.

In recent months, numerous large corporations have attempted to jump on the bitcoin bandwagon by offering BTC funds to clients.

Such is the case with JPMorgan Chase & Co. The banking giant considered the matter in late April this year. The Wall Street behemoth intended to offer its innovative BTC-focused product to private clients only.

In August, the initiative saw the light of day when JPMorgan allowed its wealth management clients to get involved with half a dozen cryptocurrency funds. One of them was a new bitcoin fund created by the digital asset company NYDIG.

In its turn, Union Investment the Investment Arm of the DZ Bank Group would reportedly enable private investors to add bitcoin to existing funds in small amounts, comprising 1-2% of their portfolios. The $500 billion German asset manager would launch the move at an unknown date in Q4.

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

Read the original:
New Zealand Launched Its First Bitcoin-Only Investment Fund - CryptoPotato

Read More..

Crypto price outlook: Bitcoin and ether could hit record highs by year-end – Markets Insider

Jordan Mansfield /Getty Images

Bitcoin's current 33% drawdown from its record high isn't fazing Fundstrat, with the firm standing by its conviction that both bitcoin and ether will hit record highs before year-end.

In a Wednesday note, Fundstrat said potential catalysts are near that could help fuel a surge in the crypto space as long-term investors continue to hold on for dear life. Those catalysts include favorable seasonality for crypto in October, the potential approval of a bitcoin ETF by the SEC, and Ethereum's highly anticipated network upgrades.

Bitcoin and ether would each need to surge 50% and 46% to eclipse their record highs of about $65,000 and $4,380, respectively. And Fundstrat thinks bitcoin can go even higher, with Tom Lee pointing to a $100,000 price target for the popular cryptocurrency earlier this year.

"Bears start to hibernate in the fall" when it comes to bitcoin, Fundstrat said, pointing to favorable historical data for bitcoin price returns in October.

Since 2011, bitcoin has posted positive returns in the month of October 60% of the time, with an average return of 32%. That's compared to a weak September, which has posted negative returns 70% of the time, with an average return of 15%.

Glassnode, Fundstrat

"The blue-chip cryptoasset has fared quite well in October, often following abysmal September performances with meteoric rebounds," Fundstrat said.

Meanwhile, Fundstrat noted that SEC Chairman Gary Gensler remains receptive to the idea of a bitcoin ETF that would invest in futures contracts and be registered under the Investments Company Act of 1940. And while a bitcoin mutual fund that invests in futures contracts has attracted only $15 million in assets since its launch, Fundstrat says that's not the point.

"The larger point here is that it probably doesn't matter how much capital flows into these futures-based ETFs so long as the spot market for bitcoin gets a boost from improved sentiment," Fundstrat said.

Finally, ether should see improved sentiment among investors as it nears another highly anticipated network upgrade that would shift to a proof-of-stake model. "We expect there to be positive sentiments surrounding this milestone which may cause increased speculative buying," Fundstrat said.

"We are steadfast in our view that any near-term selling is an opportunity to increase one's position as we still anticipate a risk-on environment through the end of the year to yield a run at all-time highs for both Bitcoin and Ethereum," Fundstrat concluded.

See more here:
Crypto price outlook: Bitcoin and ether could hit record highs by year-end - Markets Insider

Read More..

360 Internet Security – Review & Free Download

360 Total Security is a multi-engine security program that can protect your PC from viruses, malware and other threats.

360 Total Security is an antivirus program that can help you detect, prevent and remove viruses, malware and other security threats. The program is fully compatible with Windows 10 and earlier versions of the Microsoft operating system, and it has a simple and well-organized user interface that helps make this program one of the more user-friendly AV solutions around.

What makes 360 Total Security different from other antivirus solutions is that it isnt just a single AV engine. It actually encapsulates five engines: 360 Cloud Scan Engine, 360 System Repair Engine, 360 QVMII AI Engine, Avira Engine and Bitdefender Engine. Note that Avira and Bitdefender are disabled by default and enabling them can increase memory use considerably. However, if youre using a modern PC with ample RAM, then this isnt a concern and the additional engines should be turned on.

360 Total Security can perform manual scans as well as provide real-time protection. It has multiple layers that abstract the five underlying engines, and both manual and real-time operation are fast and not obtrusive. The program also provides a browser extension, which can support practically any web browser and can notify you if a website is potentially malicious. The program is detail-oriented and provides a lot of useful information when a threat is detected. It also has a sandbox feature that lets it isolate infected executables and other files.

In addition to being a complete security solution, 360 Total Security also comes with two utilities: Clean Up and Speed Up. Clean Up is a tool that detects unneeded and unused files so that you can delete them and free up space. Speed Up is a tool that can free up memory as well as optimize programs to run better by manipulating the registry and other resources.

Both programs work as advertised for the most part, but neither are particularly user-friendly. Clean Up can flag files that shouldnt be deleted and flag files in use with no means of deleting them, and Speed Up can actually corrupt installations and otherwise negatively affect performance. Both can be powerful tools in the hands of advanced users, but casual users may want to avoid these features.

Pros

Cons

Continue reading here:
360 Internet Security - Review & Free Download

Read More..

Conquering the Taproot of Cybersecurity | The State of Security – tripwire.com

What is your organizations approach to security events?For many organizations, each security alarm is treated with the same urgency as a fire.While a sense of urgency is good, the ensuing panic that occurs is not a recipe for longevity. The constant shifting of attention from one emergency to the next is fatiguing; it can often lead to mistakes that compound an event.

The all hands on deck approach is similar to an ineffective method of weeding a garden.If you have a team of gardeners who are dedicated to pulling up sprouting weeds, they will forever be chasing weed sprouts rather than attacking the main root, known as the taproot.Fortunately, there is a better way to handle security.

Attacking the taproot is not only more effective but also more cost effective. That sounds good, but it does not address a reliable approach to IT security.It has somewhat of a boil the ocean ring to it.What is needed is a more measured approach to a security program. In the accounting profession, personnel rely on a methodology known as Generally Accepted Accounting Principles (or GAAP).One of the purposes of GAAP is to protect an accounting organization from liability if something goes wrong.That is, and organization is less likely to be sued for negligence if it can be shown that the industry-recognized best practices were being followed.

Unfortunately, there isnt really a generally accepted set of IT security principles.How can organizations protect against lawsuits in the event of a security breach?One method that has advanced and matured over the years is to use the controls that are offered through the Center for Internet Security (collectively known as the CIS Controls).

Formerly a list of 20 controls, the newest CIS version has been reduced to 18 controls.This is deceptively attractive, as it has been a long-standing joke in the security community that achieving the controls is a life-long pursuit.However, it is one worth pursuing.

Why is the attainment of the CIS Controls goal so difficult?One of the main reasons is that from the very first control, an organization must take aim at nailing down a seemingly moving target: asset inventory. It is suggested that the Controls be fulfilled in the order that they are presented in the document, as they progress in a very logical way.If successful, the result is a comprehensive security strategy.However, considering that everything changes, not only from an attackers approach but also from the perspective of an organizations assets, is this ever attainable?

Tools such as Tripwire Enterprise can help an organization to confront areas such as configuration and change management.Along with that, Tripwire Log Center meets the specifications for Audit Log management.

A major hurdle is to address all of the vulnerabilities in all of the discovered assets. It should be noted that vulnerability management falls almost midway on the control list, but the comparative lack of resources when tackling vulnerabilities makes this control one of the most daunting.Some of the tools to manage vulnerabilities do it in a manner that may not relieve the resource burden in the best way.This is where a tool such as Tripwire IP360 can make more sense by correctly setting priorities. Tripwire IP360 shows the riskiest vulnerabilities, for example, by displaying the machines that represent the greatest aggregate risk in an environment. The difference between Tripwire IP360 and other vulnerability scanners is that IP360 looks at how hard it is to take advantage of a vulnerability to actually exploit it.There are some vulnerabilities that have no known exploits, for instance, and there are other vulnerabilities that are freely exploitable by anybody regardless of a persons programming knowledge just by downloading a tool from the internet.

The Tripwire IP360 algorithm uses a risk rating that distinguishes between a vulnerability that is not actively exploited such as zero-day threats and those that need to be immediately remediated.While both are important, the two extremes must be treated and prioritized differently.The heat map also analyses the severity of an exploit, meaning that it can examine if a compromise would be limited to a local event or an escalated compromise.

The fundamental Tripwire goal is to help an organization to target that taproot, not constantly pulling out the weed sprouts as they spread out throughout the yard.According to the IT Process Institute, foundational controls can help a company to detect or avoid the huge majority of all security breaches.The CIS Controls were not designed with a particular vertical in mind.The authors were looking at IT security and how to best succeed in the most cost-effective and actionable way. Whether the Controls are used in a bank or utility company, (Each has its own separate compliance requirements and audits.) if an industry best practice is used, compliance is much more likely to emerge as a result of that. IT security can be seen as a super-set of what can be found in terms of specific requirements in compliance initiatives.

Using best practices all makes the point similar to an organizations legal standard of care for all of their business practices and transactions. Evidence that a general security principle or a recognized set of controls is followed is how a company can avoid being sued for negligence. In the case of the CIS Controls used in tandem with Tripwire products, it also has the benefit of creating a manageable security environment.

To learn more about Tripwire can help, download The Executives Guide to the CIS Controls today: https://www.tripwire.com/misc/executives-guide-cis-controls-register.

Excerpt from:
Conquering the Taproot of Cybersecurity | The State of Security - tripwire.com

Read More..

PureVPN On The Frontline Of The Battle For Security And Privacy – Forbes

Something curious has happened in the internet security market since Uzair Gadit, co-founder and CEO of PureVPN launched his business in 2007. Back then, Gadit says, the market in which he specialises, providing virtual private networks, was worth less than $100m a year but customers who used his VPNs could be confident they were protecting around 25% of their online vulnerability simply through this simple precaution. Today, Gadit says, the VPN market is worth more than $3bn, yet a VPN protects around 10% of your online footprint.

This seeming mismatch is explained by the rapid pace at which the online environment has evolved over the past decade. The growth in the market reflects growing recognition of the value of VPNs for a whole variety of use cases. But the explosion of cloud computing, social media and the internet of things has been even more dramatic. The attack surface for the privacy- and security-conscious consumer has multiplied in size many times over, Gadit says.

PureVPN therefore finds itself at an inflection point. Having pioneered the use of VPNs, particularly in the consumer sector, Gadit is keen to see more consumers and businesses protect themselves in this way. But he is also conscious that more protection is now required. What were now working towards is a new vision of holistic privacy and security, he says.

Certainly, Gadit believes the VPN market will continue to grow. He points to a string of reasons why internet users might want to operate online with the anonymity and privacy that a network offers. There is growing concern about the big technology business model, he points out, which is built on tracking and targeting internet users with advertising based on their previous usage. There is nervousness about state intrusions, both in the West and in authoritarian regimes. The behaviour of internet service providers, which sometimes play customers off against one another, also upsets many people.

Then there are the changes in the way we live. The Covid-19 crisis, for example, has seen a surge in remote working, with people often connecting to the internet in public venues on unsecured networks, where their security, if not protected by a VPN, can easily be compromised. Connected devices, linked to our home networks, provide another point of attack.

PureVPN founder and CEO Uzair Gadit

There is a perception that interest in VPNs is driven by those looking to circumnavigate some of the blocks on the internet, such as restrictions on what content you can stream in a particular territory, says Gadit. That is part of the story, but our research suggests that privacy and security are much more important motivations for customers who want a VPN.

PureVPN offers a simple option for accessing such protection. Its consumer product gives you access to its VPN at a monthly cost of $10.95 (with discounts for those who sign up for contracts). The service works on any device you need it to, ensuring that you can go online while maintaining your privacy and staying secure.

Increasingly, however, Gadit believes consumers will want much more. PureVPN is therefore focused on building out a new brand, secure.com, which will offer a suite of products to consumers eager to take their protection well beyond the 10% that Gadit believes a VPN alone now offers. He has identified as many as 16 possible weaknesses that need closing in order to safeguard privacy and deliver online security.

This month, secure.com will begin rolling out the first four products, each offered on a standalone basis, that Gadit believes consumers now need. The company will begin with a tool to improve the privacy of your email communications, with an encryption facility that layers on top of your existing service. Then it plans to launch a social media tool to help consumers work out the ideal privacy and security settings for them on a particular platform. A password manager and ad-blocker will follow shortly after.

Were at a point where people are looking for a much more holistic level of security and privacy, Gadit argues. He believes PureVPN, a trusted and transparent name in its existing market, can meet that desire.

The biggest shift that weve seen over the years has been from users trusting the hardware and service providers with their security and privacy as default, to users not trusting anyone at all, Gadit adds. He forecasts a continuing convergence of privacy, security and identity in the years to come, with brands that are able to build reputations of trust and transparency playing the key role in ensuring that consumers and businesses can pursue those goals.

See the original post:
PureVPN On The Frontline Of The Battle For Security And Privacy - Forbes

Read More..

China wants to tame Internet algorithms. Its all about national security – ThePrint

Text Size:A- A+

In this weeksChinascope, we will look at ChinasGalwan clash propaganda,hidden debt, controlling the algorithms, the investigationagainst formerjustice minister and other leading stories.

Chinese state media produced a propagandabroadcaston Martyrs Day remembering the PLA soldiers who died in the Galwan Valley clash on 15 June 2020. Since 2014, China has marked 30 September as Martyrs Day to remember the Chinese soldiers who fought wars with Japan andKoreain the 1950s.

PLA soldiersvisitedthe frontline of the Galwan Valley in Ladakh, where they sang the Chinese national anthem. Thetheatrics atthe borderweresupposed to send a message to India.

Incontinuationof imposing control on algorithms,theCyberspace AdministrationofChina (CAC) has set a three-year timeline to tame the algorithms used across theInternet platforms. The CACnoticeistitledStrengthening the Comprehensive Management of Internet Information Service Algorithms.

In three years, gradually establish a comprehensive algorithm security governance system with a sound governance mechanism, a sound supervision system, and a standardized algorithm ecology, says the notice.

The regulation is targeted at Internet companies and has a national security and ideological angle.Beijing justifies the national security argument of the algorithm control by drawing parallel between adherence to Communist Party and its ideology to long term prosperity of China.

TheChinese Communist Partys internal disciplinary body is investigating former justice minister Fu Zhenghua.

Chinese state mediaannouncedZhenghuasdetention for serious violations of discipline and law.Hebecame the deputy director of the Social and Legal Affairs Committee of the CPPCC National Committee.

In 2018, he wasappointedas the justice minister despite rumours implicating him in corruption scandals. XiJinpinghad trusted Fu with aprobeinto the former head of internal security Zhou Yongkang in 2013, a case which was most discussed among the anti-corruption movement. The news about the investigation was a top trend on search engine Baidu and social media platform Weibo.

This past week, AidData a research lab at William and Mary University revealed the increase in Chinese hidden debt offered by state-owned banks and state-owned enterprises. The research has discovered $385 billion in external debt owed by 42 countries, which adds up to 10% of the GDP of these countries.

AidDatasBanking on the Belt and Roadreport for the first time has given a global view of the Chinese hidden debt. A large share of the funding offered is classified as Belt and Road Initiative (BRI) funding by China. BRI is Chinas signature development financing project that critics believe is designed to trap developing countries into unsustainable debt levels.

China has responded to the revelations without mentioning the AidData report.

All major external debt indicators were within the internationally recognized thresholds, and Chinas external debt risk is under control,said the State Administration of Foreign Exchange on Saturday.

Also read: China just promoted a military general targeted at India. And Weibo chatted about Modi in US

In related news, Goldman Sachs revealed Chinese local government debt hasgrownto $8.2 trillion at the end of 2020. The debt is almost 52% of Chinas GDP.

Over the week, real estate giant Evergrande missedanotherdebt payment of $47.5 million due on Wednesday. In the last edition ofChinascope, we told you about Evergrandescontinuingdebt problems.

And, in the week, the Peoples Republic of China (PRC) celebrated its 72ndNational Day. PRC was founded on 1 October 1949, after Mao Zedongs speech in Tiananmen Square.

On PRCs National Day, Beijing set a record by sending 38 jets across the Taiwan Strait. Peoples Liberation Army Air Force intruded into Taiwans ADIZ (air defence identification zone).

Following the record-setting incursion, PLA once again intruded into Taiwans ADIZ on 2 October.ThePLA set another record by carrying out two sorties across the Taiwan Strait. Thetallyof the sorties on 2 October added to 39 PLA aircraft crossing the Taiwan Strait for the.

The Taiwan Air Force responded byscramblingplanes to monitor the Chinese aircraft, issuing radio warnings, and mobilizing air defence assets, the Taiwan Ministry of Defencesaid.

China is facing an energy crunch because of the shortage of coal supply and Beijings carbon neutrality commitment.

Factories in 20 of the 31 provinces across China havesuffered power lossandare havingto shut down production forafew hours evencities havefacedpower cuts. Energy production has grown expensive because of the trade tussle, after which Chinabanned the import of coal from Australia.

Beijing wants a tight control on the narrative around XiJinpings common prosperity campaign. An article by blogger Li Guangman, which had made news because of its radical tone, continues to unnerve Beijing.Chinascopehadexplainedthe controversy the article created.

A Beijing-based media source told theSouth China Morning Postearlier about verbal instructions from media regulators, that Lis piece had had too negative an impact and should be toned down,wrote SCMP reporter Jun Mai.

As the origins of the Covid-19 virus continues to be debated, Xi Jinping has called forimprovement in biosecurity control in the first study session of the Politburo.

Traditional biosecurity issues and new biosecurity risks overlap with each other; foreign biological threats and internal biological risks are intertwined and coexist. Biosecurity risks have many new features, Chinas biosecurity risk prevention and control and governance system still have shortcomings and weaknesses,saida summary of Xi Jinpings remarks at the study session.

China hascriticised the USs call for an investigation into the origins of Covid-19 in the Wuhan city and instead suggested the investigation should have a global focus.

Also read: After the gaming crackdown, China to target cosmetics industry

The JoeBiden administration is set tounveil its China trade policy next week. US trade representative Katherine Tai will speak at the Center for International and Strategic Studies in Washington DC, where she will announce the policy.

Tai recentlytoldPoliticoin an interview that the Biden administration will build on tariffs imposed by theDonaldTrump administration under the trade war with China.

China has backed North Koreas call to revise the international sanctions imposed on DPRK. Hua Chunying hascalledon the US to revise sanctions that are related to humanitarian aspects.

North Korea recentlytesteda hypersonic missile,a capabilitythat onlya select group of countries have deployedso far. China is one of thecandidatesthat may have helped North Korea with its hypersonic missile programme others being Russia and Iran.

Evergrande Is a Convenient Villain for Xi Richard McGregor

How a Forgotten Religion Shaped China Mao Ming

A History of the Islamic States Media Warfare Against China Lucas Webber

The inside story of the Peace Corps in China Daniel Schoolenberg

After Japan returns to the era of short-lived regimes, one of the bigger problems is that relations with neighbouring countries will continue to decline and the Japanese state will become more and more isolated in East Asia,saidChen Yan, Executive Dean of the Japanese Enterprise Research Institute (China).

A video of the farmers protest in Barnala (Punjab) was viewed 60,000 times on Weibo. Indian farmersraised anti-Modi, anti-imperialist, and anti-capitalist enterprise slogans at the rally, said the account that posted the video.

How the Chinese state handles labour unrest, with Manfred Elfstrom Sinica Podcast

Key Takeaways From AidDatas New Report on How Chinas Finances the BRI China in Africa Podcast

China will mark the 110thanniversary of the Xinhai Revolution on Sunday. The 1911 Xinhai Revolution ended Chinas last imperial dynasty.

This is a weekly round-up that Aadil Brar will write about whats buzzing in China. This will soon be available as a subscribers-only product.

(Edited by Prashant)

Subscribe to our channels on YouTube & Telegram

Why news media is in crisis & How you can fix it

India needs free, fair, non-hyphenated and questioning journalism even more as it faces multiple crises.

But the news media is in a crisis of its own. There have been brutal layoffs and pay-cuts. The best of journalism is shrinking, yielding to crude prime-time spectacle.

ThePrint has the finest young reporters, columnists and editors working for it. Sustaining journalism of this quality needs smart and thinking people like you to pay for it. Whether you live in India or overseas, you can do it here.

Support Our Journalism

Read the original:
China wants to tame Internet algorithms. Its all about national security - ThePrint

Read More..

91.5% of All Malware Arrived Over HTTPS Connections in Q2 – Tech.co

Across Q2 of 2021, 91.5% of all malware discovered had arrived across an encrypted connection, a new study has found.

In other words, standard internet security protocols are no longer enough to stop the vast majority of malicious software something that everyone with an internet connection needs to make sure they understand.

The study, out today from security company WatchGuard Technologies, also pinpointed a few additional big trends in cyber threats: Network attacks and the ever-popular ransomware threat. Here are the biggest takeaways.

If you're on the internet, you likely recognize HTTPS from the start of most links you've visited. It stands for Hypertext Transfer Protocol Secure, and it means that information transmitted between your device and the website has been encrypted. But all that means is that your data can't be compromised by a third-party intruder. The website itself can still send your malware.

And, according new data, malware is more and more frequently found on these HTTPS-encrypted sites.

Put simply, any organization that is not examining encrypted HTTPS traffic at the perimeter is missing 9/10 of all malware, WatchGuard says.

After all, these websites claim to be secure right there in the acronym, and that makes them the best way to deliver malware to unsuspecting victims.

Network attacks are booming in Q2, with plenty of hackers attempting to access a company's internal network. They're up 22% over the previous quarter, which by WatchGuard's analysis is the highest volume since three years ago in early 2018.

Q1 had almost 4.1 million network attacks, while Q2 boosted that number by another million.

A rise in this particular type of security concern may seem counterintuitive, given the pandemic-driven shift towards remote workforces over the past year and a half. But company networks are still around, and keeping up with perimeter security is more important than ever.

Ransomware detections were actually dropping in the months between 2018 and 2020, which is part of the reason why they've seemed to ramp up so strongly ever since. In Q2 2021, that trend continues the quarter included one particularly high-profile case in which the Colonial Pipeline, a supplier of roughly 45% of all oil to the East Coast, was shut down temporarily.

The first half of 2021 has already seen nearly as many ransomware detections as the entirety of 2020, and WatchGuard projects that the entire year will see a volume increase that's more than 150% up from the previous year.

As ever, businesses small and large should keep updated on the latest security technologies, from VPNs all the way up to the top remote access software available. And whatever you do, don't trust a website just because it has the HTTPS stamp of approval.

Read more from the original source:
91.5% of All Malware Arrived Over HTTPS Connections in Q2 - Tech.co

Read More..