Your cart is currently empty!
Category: NSA
-
Flying Cars and Drones Require Absolutely Perfect Cyber Security
In fairness, whether flying cars every actually materialize remains to be seen. However, it is obvious that the technology does already exist to make them happen. Beyond the obvious issue as to whether people would use them, there is also the need to for 100% data security. Similarly as to self-driving Tesla’s, hacking needs to… Read more
-
6,500 Crypto Wallets Were Drained by “ElectroRAT”
A new remote access tool (RAT) has been discovered being used in an extensive campaign. The attack has targeted cryptocurrency users in an attempt to collect their private keys and ultimately to drain their wallets. Read about it in detail here. Cryptocurrency security is a specialty of ours at BLAKFX. Our data security company set… Read more
-
The Next Cyber Attack Is Already Happening
This is a very good article from the New Yorker on the potential of a mainstream cyber attack. New Yorker Article. One of the substantive appeals of a cyber security firm of the caliber of BLAKFX, is that we have developed an entire suite of products to meet the vast array of cyber attack threats.… Read more
-
Online Dating & Adult Industries Can Be Completely Private and Protect User Data
Adult cam site, CAM4 had a potentially serious breach of user data with over 10billion records found in the clear on a production server. Last week, dating app MeetMindful was hacked and millions of user accounts had personal information exposed. Obviously, most people would not want it public knowledge that they were a performer or… Read more
-
BLAKFX Offers “One-Stop” Data and Physical Security Solutions
BLAKFX offers a full range of custom products and services including a state of the art SDK (backed by 28 patents) that provides the most secure data encryption technology in the world. Our products include: BLAKFX DNA Crypto Helix22™ Advanced Cybersecurity & DARKHYDRA3 Physical Security Electronic/RF Security Ransomware Protection Tactical Communications Quantum Computing Immunity The… Read more
-
Hypersonic flight and IoT is All About 5G Speed – Helix22 Offers by far the Lowest Data Latency
Military experts foresee that the 5G system will play an essential role for the use of hypersonic weapons i.e. missiles, including those bearing nuclear warheads, which travel at a speed superior to Mach 5 (five times the speed of sound). In order to guide them on variable trajectories, changing direction in a fraction of a… Read more
-
The US Gov’t Needs Universal Device2Device (D2D) Encryption – E2E is misleading & obsolete
Wait a minute you ask, what is device2device encryption and isn’t end-to-end encryption good enough? Well, not if you as the “user” define yourself and your device as one of the ends. If you as a person, believe that you will be the only person that can read your message(s), open your file(s) or access… Read more
-
Helix22 Protects Data Perfectly On Any Network, Any Platform, Any Device and In Any Programming Language
The U.S. Cybersecurity and Infrastructure Security Agency urged federal agencies to deploy ad-blocking software and standardize web browser usage across their workforces in order to fend off advertisements implanted with malware. Personally, though this is a noble effort, we found this paragraph of the document to be the most telling. “For federal agencies, defending against these… Read more
-
New Jersey Firm BLAKFX Offers Quantum Immune Data Security
The inevitable advance of quantum computing means data security is one step closer to facing a threat more formidable than anything before. The security concern is that quantum computers will be able to crack RSA public key cryptography, used to protect data in transit. That means security teams will have to pivot to new post-quantum cryptography… Read more
-
The US Gov’t Needs This Innovative American Solution for Cyber & National Security
As the scope of the cyber attacks on numerous US government departments become more clear, it is clear that the US federal government is at an extreme risk of a serious intrusion and is also vulnerable to espionage tactics. National security is literally at stake across a wide range of critical areas: intelligence national infrastructure… Read more