The US Watches Warily for Russia-Ukraine Tensions to Spill Over

Conversations with more than a dozen senior cybersecurity leaders in both the public and private sector outline the major areas of risk. Powered by...

Read More

Twitter Has Started Blocking Porn in Germany

Dozens of accounts have been vanished as Twitter bows to pressure to make it harder for children to find adult content online. Powered by WPeMatico

Read More
Victoria’s Secret Files Metaverse Related Trademark Applications
Feb16

Victoria’s Secret Files Metaverse Related Trademark Applications

Victoria’s Secret, the renowned designer lingerie company, has filed a series of trademark patents that suggest the organization is ready to offer its products in the metaverse. The announcement was made by Mike Kondoudis, a trademark attorney, who stated these actions might be the first step for the company to present their products using blockchain tech, signaling the use of NFTs. Victoria’s Secret to Enter the Metaverse Another big...

Read More
President Lukashenko Signs Decree to Create Crypto Wallet Register in Belarus
Feb16

President Lukashenko Signs Decree to Create Crypto Wallet Register in Belarus

President Alexander Lukashenko has signed another decree regulating the crypto economy of Belarus. It envisages the establishment of a register for cryptocurrency wallets and addresses certain legal aspects pertaining to the circulation of cryptocurrencies in the country. Presidential Decree Aims to Prevent Use of Crypto Wallets in Criminal Activities Belarusian President Alexander Lukashenko has signed a new decree that expands his...

Read More
Point Network Launches Full Web3 Architecture
Feb16

Point Network Launches Full Web3 Architecture

PRESS RELEASE. This was the title of a recent talk by Serge Var, CEO and Co-Founder of Point Labs, at the 2022 Web 3.0 Conference in January. Serge presented arguments that despite numerous projects calling themselves “Web 3.0” and “decentralized”, we are not quite there yet: we’re still relying too heavily on centralized systems, using centralized domains that can be taken away by governments or hijacked, untrusted centralized...

Read More