04.07.2022 Views

Cyber Defense eMagazine July Edition for 2022

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

While subtle, these differences should alert any user to potential malicious activity. At the very least,<br />

users engaging with such giveaways should always make an ef<strong>for</strong>t to confirm the legitimacy of the site<br />

by comparing it with a known and confirmed site and looking <strong>for</strong> any discrepancies.<br />

Looking Ahead<br />

The persistence of phishing attacks alongside more sophisticated web3 attacks highlights the multiple<br />

frontiers on which the web3 ecosystem must defend itself. Web3 has the potential to be the most secure<br />

iteration of the internet to date. But to get there, web3 projects have to take an ongoing, end-to-end<br />

approach to their security. This means making use of tools such as routine smart contract audits,<br />

blockchain analytics, and implementing practices of decentralization. As the BAYC hack shows, failure<br />

to do so spells disaster not only <strong>for</strong> the projects, but <strong>for</strong> their communities as well.<br />

About the Author<br />

Professor Gu is the Tang Family Assistant Professor of Computer<br />

Science at Columbia University and Co-Founder of CertiK. He holds a<br />

Ph.D. in Computer Science from Yale University and a Bachelor’s<br />

degree from Tsinghua University. He is the primary designer and<br />

developer of CertiKOS and SeKVM. Gu has received: an SOSP Best<br />

Paper Award, a CACM Research Highlight, and a Yale Distinguished<br />

Dissertation Award. You can find more in<strong>for</strong>mation about CertiK here:<br />

https://www.certik.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!