GRID_STYLE

NONE

ΡΟΗ:

latest

ΑΠΟΚΛΕΙΣΤΙΚΟ! Συνάντηση-έκπληξη του Κ. Μητσοτάκη με (το "πουλέν" του Βενιζέλου) Κυριάκο Πιερρακάκη...

Από τον Γιάννη Δαίδαλο.   ΑΠΟΚΛΕΙΣΤΙΚΟ.  Συνάντηση με τον πρώην πρόεδρο της ΝΔ Βαγγέλη Μεϊμαράκη, διάρκειας 45 λεπτών, είχε σήμερα...

Από τον Γιάννη Δαίδαλο.  
ΑΠΟΚΛΕΙΣΤΙΚΟ. 

Συνάντηση με τον πρώην πρόεδρο της ΝΔ Βαγγέλη Μεϊμαράκη, διάρκειας 45 λεπτών, είχε σήμερα Πέμπτη ο Κυριάκος Μητσοτάκης, όπως ανακοινώθηκε.

Σύμφωνα με αποκλειστικές πληροφορίες του Press-gr όμως ο πρόεδρος της ΝΔ είχε και μια άλλη, σημαντική, συνάντηση η οποία δεν ανακοινώθηκε. Συγκεκριμένα δέχτηκε στο γραφείο του στη Βουλή ένα πρόσωπο - έκπληξη, τον Κυριάκο Πιερρακάκη...

Ο 34χρονος Κ. Πιερρακάκης διετέλεσε μέλος του Πολιτικού Συμβουλίου του ΠΑΣΟΚ επί ηγεσίας του Ευάγγελου Βενιζέλου, του οποίου υπήρξε και "πουλέν". Στις εκλογές του 2015 ήταν και υποψήφιος βουλευτής (στην τελευταία τιμητική θέση) στο Επικρατείας ενώ κατά την ίδια περίοδο φερόταν και ως ένας από τους μελλοντικούς δελφίνους για την ηγεσία εκ μέρους της "νέας γενιάς" στελεχών. 

Αυτή η ιδιότητα του κ. Πιερρακάκη δίνει ιδιαίτερο ενδιαφέρον στη συνάντησή του με τον πρόεδρο της ΝΔ ο οποίος έχει καταστήσει σαφή την πρόθεσή του για "ανοίγματα" ενώ πρόσφατα παρέστη προσωπικά και στο προγραμματικό συνέδριο της "Δημοκρατικής Συμπαράταξης". Σε αυτό το πλαίσιο, κατά τις ίδιες πληροφορίες, ήταν και η συζήτησή τους... 

Κατά το παρελθόν, ο κ. Πιερρακάκης υπηρέτησε επίσης ως Πρόεδρος του Ινστιτούτου Νεολαίας, σύμβουλος στο Υπουργείο Ανάπτυξης και καθηγητής στο Αthens Information Technology (AIT). Το 2014, υπήρξε και μέλος της ομάδας διαπραγμάτευσης της ελληνικής κυβέρνησης (με πρωθυπουργό τον Αντ. Σαμαρά και αντιπρόεδρο του Ευ. Βενιζέλο) με την τρόικα των δανειστών. Σήμερα είναι διευθυντής ερευνών του οργανισμού έρευνας και ανάλυσης διαΝΕΟσις.

2 σχόλια

  1. Πιστεύω ότι πάνε στον Κυριάκο Πιερρακάκη ώστε να τους δώσει της γνώσεις του [γιατί έχει] σε στατιστικά δεδομένα τα οποία λέγονται και κρυφές δημοκοπήσεις η οποίες ΔΕΝ ΕΊΝΑΙ ΚΑΛΕΣ για όλο το πολίτικο σύστημα.. Ο Κυριάκος Πιερρακάκης είναι και γνώστης πληροφορικής σίγουρα [[ΕΝΑΣ ΚΑΛΟΣ ΧΑΚΕΡ]] σε μια χώρα όπως η Ελλάδα που μερικοί
    > αόρατοι < κρατάνε αυτό που λέγεται η ηλεκτρονική ασφάλεια σας...

    An unknown hacker has just stolen nearly $32 million worth of Ethereum – one of the most popular and increasingly valuable cryptocurrencies – from Ethereum wallet accounts linked to at least three companies that seem to have been hacked.

    This is the third Ethereum cryptocurrency heist that came out two days after an alleged hacker stole $7.4 million worth of Ether from trading platform CoinDash, and two weeks after an unknown attacker hacked into South Korean cryptocurrency exchange Bithumb and stole more than $1 Million in Ether and Bitcoins from user accounts.

    On Wednesday, Smart contract coding company Parity issued a security alert, warning of a critical vulnerability in Parity's Ethereum Wallet software, which is described as "the fastest and most secure way of interacting with the Ethereum network."

    Exploiting the vulnerability allowed attackers to compromise at least three accounts and steal nearly 153,000 units of Ether worth just almost US$32 million at the current price.

    The attack started late Tuesday and continued on Wednesday, resulting in a total of three transactions, which can be seen on Etherscan.io. The three victims of the attack identified are:Swarm City æternity blockchain Edgeless Casino
    Parity says the vulnerability affected the contract used to create multi-signature Ethereum wallets in Parity version 1.5 or later, warning its users to move their Ether from their in-browser wallets to more secure accounts immediately.

    Yes, 377,000 more Ether worth over $75 Million were also drained by white hat hackers.As the attack began, a group of white hat hackers used the same exploit to drain approximately 377,000 Ether from other vulnerable wallets into holding accounts in order to protect them from black hat hackers, Coindesk reports.

    The Whitehats are currently holding the rescued funds and has promised to return the funds to their owners once this security threat passed.

    "The White Hat Group were made aware of a vulnerability in a specific version of a commonly used multisig contract. This vulnerability was trivial to execute, so they took the necessary action to drain every vulnerable multisig they could find as quickly as possible," White Hats wrote on Reddit.

    "We will be creating another multisig for you that has the same settings as your old multisig but with the vulnerability removed and we will return your funds to you there."

    The company has just released an updated version of the Parity software fixing the vulnerability.

    ΑπάντησηΔιαγραφή
  2. All it took was just 3 minutes and 'a simple trick' for a hacker to steal more than $7 Million worth of Ethereum in a recent blow to the crypto currency market.

    The heist happened after an Israeli blockchain technology startup project for the trading of Ether, called CoinDash, launched an Initial Coin Offering (ICO), allowing investors to pay with Ethereum and send funds to token sale's smart contact address..

    But within three minutes of the ICO launch, an unknown hacker stole more than $7 Million worth of Ether tokens by tricking CoinDash's investors into sending 43438.455 Ether to the wrong address owned by the attacker.

    How the Hacker did this? CoinDash's ICO posted an Ethereum address on its website for investors to pay with Ethereum and send funds.

    However, within a few minutes of the launch, CoinDash warned that its website had been hacked and the sending address was replaced by a fraudulent address, asking people not to send Ethereum to the posted address.

    But it was too late, as the little change of address had already redirected cryptocurrencies sent by investors into the wallet of the hacker.

    "It is unfortunate for us to announce that we have suffered a hacking attack during our Token Sale event," reads a statement posted on the company's official website.
    "During the attack, $7 Million was stolen by a currently unknown perpetrator. The CoinDash Token Sale secured $6.4 Million from our early contributors and whitelist participants, and we are grateful for your support and contribution."

    CoinDash doesn't know who is responsible for the attack, and the worst part is that the company is still under attack.

    Investors are strongly advised to DO NOT send any Ether (ETH) to any address on the site, as CoinDash has terminated the Token Sale.

    According to a CoinDash Slack channel screenshot posted to Reddit, CoinDash realised what was happening within 3 minutes, but it was too late.


    Some people even believe that the incident was not a hack, rather an insider's job. One user said: "Is there any proof that this was a hack. What if Coindash put an address in and then cried hacker to get away with free ETH?"

    The CoinDash website is offline, at the time of publication, and the company is asking affected investors who sent their Ether to the wrong address to collect the CoinDash token (CDT) by submitting information to this link.

    However, investors sending Ether to any fraudulent address after the website was shut down will not be compensated.
    "CoinDash is responsible to all of its contributors and will send CDTs [CoinDash Tokens] reflective of each contribution," the company noted.

    "Contributors that sent ETH to the fraudulent Ethereum address, which was maliciously placed on our website, and sent ETH to the CoinDash.io official address will receive their CDT tokens accordingly."

    This isn't the first time an ICO funding has been hacked. Last year, $50 Million was disappeared after hackers exploited code weaknesses in the Decentralised Anonymous Organisation (DAO) venture capital fund.

    Uros

    ΑπάντησηΔιαγραφή

ΠΡΟΣΟΧΗ! Την ευθύνη για το περιεχόμενο των σχολίων φέρει αποκλειστικά ο συγγραφέας τους και όχι το site. Η ανάρτηση των σχολίων μπορεί να έχει μια μικρή χρονική καθυστέρηση

Αρχειοθήκη ιστολογίου

ΦΟΡΜΑ ΕΠΙΚΟΙΝΩΝΙΑΣ

Όνομα

Ηλεκτρονικό ταχυδρομείο *

Μήνυμα *