Blockchain has made a name for itself by bringing a near fool-proof level of verification to the age of the internet. This is due to the unique way blockchain stores data: Essentially, each new block of data connects to all the blocks before it in a cryptographic chain in such a way that it’s essentially impossible to tamper with. All…
A form of cyber fraud called “SMiShing” short for “short message service” phishing has increased by 700 percent in six months SAN ANTONIO, Oct. 20, 2021 (GLOBE NEWSWIRE) — According to a recent Coinbase Security Team article, financial fraud using SMiShing, a form of phishing that uses mobile phones as the attack platform, is now one of the most used cyber-attacks…
New Standards-Based Pilot Program Focused on Securing the Information and Communications Technology (ICT) Supply Chain with Advanced Authentication Technologies Including a Tokenized Mobile Equipment Identifier DALLAS, Oct. 19, 2021 /PRNewswire/ — COMSovereign Holding Corp. (NASDAQ: COMS) (“COMSovereign” or the “Company”), a U.S.-based developer of 4G LTE Advanced and 5G Communication Systems and Solutions and Total Network Solutions (“TNS”), a developer…
Though Bitcoin was first created in 2008, most of us had never heard of it until 2017 when it had its first meteoric rise to nearly $20k per coin. More people were then made aware of this revolutionary technology when Bitcoin made its historic bull run from $10k to over $60k in the span of six months from 2020 to…
It was 33 years ago when I started my entrepreneurial journey into action sports with Thruster. I’m stoked to finally be recognized as a innovator for the sport of wakeboarding, wake skating and wake surfing in the Wake Sports Hall of Fame. At Thruster Thruster Wake I created the first board design, that allowed riders to sink it into the…
BLOCKCHAIN FOR ICT SUPPLY CHAIN SECURITY PART 3: SECURING THE NATIONAL WIRELESS INFRASTRUCTURE By Kevin L. Jackson, SVP, Total Network Services Corporation This is Part 3 of a 3 Part Series on the Enhanced Mobile Equipment Identifier (E-MEID) and how it can be used to improve ICT Supply Chain Security. The E-MEID is a tokenized MEID that creates a globally…
BLOCKCHAIN FOR ICT SUPPLY CHAIN SECURITY: PART 2 – IOT AND NFT MANAGEMENT USE CASES By Kevin L. Jackson, SVP, Total Network Services Corporation This is Part 2 of a 3 Part Series on the Enhanced Mobile Equipment Identifier (E-MEID) and how it can be used to improve ICT Supply Chain Security. The E-MEID is a tokenized MEID that creates…
Hosted by X Games Gold Medalist Elliot Sloan & FinTech Pioneer Thomas Carter, MCE’s Mega Crypto Experience was put on to promote the user-friendly, widespread adoption of cryptocurrencies and digital assets. Today, two fundamental problems exist in the world of finance: inflation and centralized control. Cryptocurrency is a response to these problems and has gone from hardly viable and…
By Kevin L. Jackson, SVP, Total Network Services Corporation This is Part 1 of a 3 Part Series on the Enhanced Mobile Equipment Identifier (E-MEID) and how it can be used to improve ICT Supply Chain Security. The E-MEID is a tokenized MEID that creates a globally unique, auditable, and verifiable data repository for any physical or virtual asset connected…