Uncloak is excited to announce today that the UNC Token will migrate to Binance Chain. Binance Chain is a blockchain software system developed by Binance and the community, with a focus on security, speed and user experience.
“Security is considered a critical issue so we at Binance are delighted that Uncloak, who share the same values, will be the first cybersecurity project to migrate tokens onto Binance Chain”
— Ted Lin, Chief Growth Officer at Binance
The Binance Chain ecosystem is growing larger each day and has already provided unparalleled liquidity for the projects that have issued tokens and listed…
Uncloak is delighted to announce it has signed an agreement with P2PB2B, a leading European exchange, and as a result, UNC — the token of Uncloak will be listed on P2PB2B!
P2PB2B is an EU licensed exchange, listed in the top 20 on CoinMarketCap , has a daily trading volume of over 400 million USD, with more than 150,000 active traders. P2PB2B is a market leader in security and customer satisfaction and has been in the market since 2014.
The P2PB2B managing director Glib Ushakov said: “I am pleased to cooperate with Uncloak. …
“We have now reached our main crowdsale for the Uncloak UNC token. Our team and partners are committed to ensuring that we produce the most disruptive cyber security solution for businesses to date.
We will also be announcing our partnership with a listing exchange shortly to allow an even wider number of investors to gain access to our UNC token which is the Utility token used to power the Uncloak ecosystem.
This is an unique opportunity to participate in our our vision and future for Cyber Security. Don’t miss out”
Tayo Dada — CEO uncloak
If you have already whitelisted…
We are pleased to announce that the Uncloak TGE is coming up starting with whitelisting for the public presale round:
General info for the public presale:
Uncloak — taking on the…
January 29, 2019 — Since May 2018, leading identity management system SelfKey has been partnering with Uncloak.io to ensure the SelfKey Identity Wallet meets the highest possible security standards. Launched in 2016, Uncloak has established itself as one of the most knowledgeable and innovative cyber security agency’s in the blockchain space and the partnership with SelfKey is already bearing fruit.
More specifically, the SelfKey Identity Wallet has undergone a stringent audit, which explored possible vulnerabilities and tested existing security measures. After a thorough examination by the cyber security experts at Uncloak, the Wallet convincingly passed the security audit.
How is Uncloak using Blockchain technology?
To answer that question, the first thing to say is, Uncloak is building a platform for cybersecurity research and protection. We are connecting cybersecurity experts and businesses who need better data security using a Blockchain-based network.
Now, let’s look at the way Uncloak uses Blockchain on a functional level.
The Blockchain system we’re creating removes intermediaries like brokers. To achieve economies of scale it’s important that security consultants don’t need to be involved directly when end users install Uncloak. We’re avoiding the administrative overhead of working with each IT reseller in…
30% of large UK companies were targeted by crypto-jacking cyber-attacks during one thirty day period, according to a recent survey.
That staggering figure is a new indicator of the way malware-based fraud is escalating. Typical businesspeople are not even aware that crypto-jacking is a threat to their IT infrastructure, and criminals are taking advantage of that lack of awareness.
What is crypto-jacking?
A malware based cyber-attack, crypto jacking is perpetrated using hidden software that’s delivered to victim’s computers via an infected email or website.
Once crypto-jacking malware is running on an infected computer, it siphons off a…
By Phil Jackson
Testers are the quality assurance gatekeepers for organisations’ applications. They’re typically meticulous, level-headed people not given to emotional excesses, but if you want to hear a professional tester grumble and grind their teeth, just ask them one of these questions:
“Why are you coding?”
“Why can’t you code?”
“Why are there still bugs the application? I thought you tested it.”
“Why can’t you test everything?”
Expectations and reality
The typical non-tech person’s expectation of a tester is that they will be able to find all the bugs in the deepest, darkest, most obscure parts of the application…
If your mental image of hacking is a bunch of scruffy teenagers in a basement furiously punching code into a screen as they try and beat a supercomputer in a virtual espionage contest, then you are probably getting your impressions from TV, not the real world.
Hackers perpetrating fraud on the internet are usually well-organised criminals using specially designed software tools. They don’t attack computers systems directly because computers are hard targets; they go after the people who use them.
Hackers target humans
The EU GDPR guidelines stipulate that companies must “install appropriate technical and organisational safeguards that ensure the security of the personal data, including protection against unauthorised or unlawful processing.”
The GDPR regime is designed to protect the data privacy of EU citizens, but because the regulations seek to penalise any company that allows their data to be compromised, the reach of the GDPR is actually global.
The penalties for data compromise specified in GDPR are substantial. …