article thumbnail

Web3Auth secures $13M from Sequoia India to simplify crypto onboarding and authentication

TechCrunch

Web3 is seen as the future of the internet because it allows people to control their own data and digital assets, but crypto developers have been learning from the past when it comes to onboarding new users. workflows on nearly every traditional internet platform. authentication space. “We Image Credits: Web3Auth.

article thumbnail

Capsule gets $1.5M to build ‘super simple’ decentralized social media

TechCrunch

” Cryptocat author gets insanely fast backing to build P2P tech for social media. Given the intent with TIC is to hosts all sorts of decentralized apps it’s possible — indeed, likely — that a bunch of decentralized social media plays will emerge. Polychain Capital outted its Beacon Fund last September.

Media 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Virtual social network IMVU raises $35M from China’s NetEase and others

TechCrunch

The line between social networking and gaming is increasingly blurring , and internet incumbents are taking notice. NetEase, the second-largest gaming company in China (behind Tencent), is among a group of investors who just backed IMVU, an avatar-focused social network operating out of California.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

This shows that many modern cyber security challenges are network-agnostic, which means the most popular cyber attack methods typically don’t focus on the network technology the company uses to access the internet. The need for improved rural internet service has been recognized by both governments and businesses alike.

Wireless 222
article thumbnail

Kenyan startup Wowzi secures $3.2 million from 4DX Ventures, Andela co-founder to expand across Africa

TechCrunch

Kenyan startup Wowzi has secured new funding to expand the reach of its platform, which turns social media users into brand influencers, to West and Southern Africa — as it taps the increasing usage of social sites across the continent driven by the proliferation of smartphones and a deepening internet penetration.

Media 250
article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. Kill chain Attack technique Deception defense Initial Access Uses stolen/purchased credentials to access internet-facing applications like IdPs, VPNs, RDP, and VDI.

article thumbnail

Identity security platform Oort bags new cash to grow its product

TechCrunch

Joined by Didi Dotan, the former chief architect of identity at EMC and director of identity services at Cisco, Caulfield set out to launch a service that could detect and respond to identity threats — e.g. social engineering, phishing and malware — at “enterprise scale.” VC firms poured $2.3