Top

NS Studio and Factor Labs to Enhance Military Security with Blockchain Technology

Web3 & Enterprise·August 11, 2023, 2:28 AM

Korean game developer NS Studio announced on Thursday its collaborative research effort with blockchain-based security solutions company Factor Labs to boost the security system of its specialized virtual reality simulator used in military training centers and multinational security firms.

Photo by Filip Andrejevic on Unsplash

 

Protecting special combat forces

The two companies signed a memorandum of understanding (MOU) to develop a blockchain-based security system to be integrated into military training equipment that aims to safeguard the identity and behavioral data of special combat forces. Factor Labs’ security technology and blockchain expertise will be integrated into NS Studio’s military training programs, facilitating safer training sessions.

“Given the fact that special combat forces are important assets whose identities are considered national secrets, we want to amp up the security of the simulation programs that keep a record of their identities and behavioral patterns using blockchain technology,” the two companies said in a joint statement.

“We have begun developing the necessary technology for this project and are preparing to implement the security program starting in the latter half of this year.”

 

Blockchain’s role in military security

This collaboration underscores the increasing role of cutting-edge technologies like blockchain in ensuring the security and privacy of sensitive data not just in the financial context but also in military and security contexts. The combined efforts of NS Studio and Factor Labs are poised to contribute to the advancement of secure training simulations for special operations personnel.

More to Read
View All
Markets·

Aug 21, 2025

China mulls yuan-pegged stablecoin approval

The Chinese authorities are reportedly mulling over the possibility of approving the use of stablecoins pegged to and backed by the Chinese yuan. That’s according to a report published by Reuters on Aug. 20, with the publication citing “sources familiar with the matter.”Photo by Eric Prouzet on UnsplashInternationalization of the Chinese yuanChina’s State Council, its cabinet and primary administrative authority, has scheduled a review of yuan-backed stablecoins for later this month, a development that could potentially lead to their approval. The Chinese have been leaders in recent years in the development of a central bank digital currency (CBDC), the digital yuan. The digital yuan was further along in its development than any other CBDC globally, with the Chinese making concerted efforts to bring the digital currency into use at home, with an eye toward global use for international trade. While the U.S. dollar has enjoyed an extended period as the world’s reserve currency, the weaponization of the currency by the U.S., particularly through the application of sanctions, has led BRICS (Brazil, Russia, India, China and South Africa) nations to consider alternatives. One of Reuters sources asserted that the Chinese authorities are now homing in on the potential to internationalize the yuan via stablecoins. Setting the tone for stablecoin useMembers of the Chinese government leadership are expected to establish the tone for stablecoin use following their upcoming review, outlining the parameters within which the Chinese authorities will permit their use. Reacting to this development, Robin Brooks, a senior fellow at the Brookings Institution, asserted that China’s newfound interest in yuan-backed stablecoins is a sign of “how insecure China is in the global financial system.” Brooks added that the way to internationalize a sovereign currency is to promote the rule of law and property rights rather than pursue the use of stablecoins, which he described as “ridiculous.”  Growing global interestWhile the Brookings Institution is not directly backed by the U.S. government, the organization is nevertheless a Washington, D.C.-based think tank. Despite Brooks’ objection to the use of stablecoins, China is not the only nation to show interest in using them.Taking to X, Raphaël Bloch, co-founder of crypto media platform The Big Whale, pointed out that increasingly, nations around the world are embracing stablecoins due to the efficiency of global currency distribution that is possible via public blockchain networks.  Additionally, stablecoins offer an effective means of government debt financing, given that stablecoin reserves are backed by government bonds. In the U.S., President Donald Trump has ruled out the pursuit of a CBDC. Last month, the U.S. House of Representatives passed the Anti-CBDC Act to prohibit the development of a CBDC by the Federal Reserve. Instead, Trump has said that a stablecoin regulatory bill working its way through the legislative system will ensure global dominance for the U.S. in the crypto sector. In June a Deutsche Bank strategist claimed that the legislation would strengthen the U.S. dollar’s global dominance, with several American politicians having since expressed the same view.Earlier this week, Japan’s Financial Services Agency (FSA) signaled that it is likely to approve the issuance of a yen-pegged stablecoin. Meanwhile, the authorities in South Korea are working on a bill related to won-pegged stablecoins.

news
Policy & Regulation·

Aug 09, 2023

North Gyeongsang Province Recruits Youth for Metaverse Content Competition

North Gyeongsang Province Recruits Youth for Metaverse Content CompetitionNorth Gyeongsang Province has announced that it is recruiting participants for the Youth Metaverse Content Development Competition, which will provide young people with an opportunity to showcase their ideas and technical skills in the metaverse.Photo by GuerrillaBuzz on UnsplashThe competition is part of the Youth Metaverse Creation Festival, which aims to push young individuals to participate directly in policymaking, prepare for their crucial role in the oncoming metaverse era, and strengthen their digital capabilities.Participation requirementsParticipants are required to complete an assignment in the form of their choice related to fields that the youth are interested in. Young people from high schoolers up to those aged 34 are eligible to participate. Both Korean nationals and foreigners are invited to sign up either individually or as a team.Eight teams will be selected in the first round of document evaluation this month. Afterward, a second round of presentations will take place in October to choose the three final participating teams.Winning rewardsThe first round of selected teams will receive 3 million KRW (approximately $2,300) for their assignment and a head-mounted display, among other benefits. The finalists will not only be awarded 6 million KRW but also be given the chance to participate in various startup support programs throughout North Gyeongsang Province through expert consultations.

news
Policy & Regulation·

Jun 11, 2024

Singaporean authorities alert businesses to Bitcoin ransomware risk

Akira ransomware, responsible for stealing $42 million from over 250 organizations across North America, Europe and Australia in just a year, is now targeting businesses in Singapore. In response, Singaporean authorities have issued a joint advisory warning local businesses about the increasing threat posed by a variant of this ransomware.Photo by Mike Enerio on UnsplashAlert follows complaintsThe alert follows multiple complaints from victims, prompting agencies like the Cyber Security Agency of Singapore (CSA), the Singapore Police Force (SPF) and the Personal Data Protection Commission (PDPC) to take action. These agencies emphasize the urgency of recognizing and combating this threat. How Akira operatesAkira affiliates employ various techniques to infiltrate a victim's network. These include exploiting known vulernabilities. For example, that could mean the targeting of services like Cisco virtual private networks (VPNs) that have been configured without multi-factor authentication (MFA). Another approach that the ransomware incorporates is attacking external-facing services such as the Remote Desktop Protocol (RDP) via brute force. Social engineering is another tool within its repertoire. This involves tricking victims into downloading malicious software or entering credentials on phishing websites. There is a marketplace for compromised credentials in the dark web. Akira also relies on such data, acquiring it from access brokers who sell network access.  Once inside a network, Akira affiliates often create new domain accounts to maintain persistent access, even after reboots. They use numerous tools to steal user credentials, escalate privileges and spread throughout the network. Detection and prevention measuresThe Singaporean advisory outlines several strategies for detecting, deterring and neutralizing Akira attacks. Authorities strongly advise against paying ransoms, on the basis that doing so does not guarantee data recovery or prevent future attacks. Authorities also warn that paying ransoms can encourage further attacks. The FBI has noted that Akira operators do not contact victims. Instead, they expect victims to initiate contact. Payment in BitcoinThe advisory outlines how Bitcoin is implicated in the ransomware scam. It states:”Ransom payments are requested in Bitcoin, which are directed to cryptocurrency wallet addresses specified by the affiliates. The TOR site (.onion) where victims contact the affiliates, contains stolen information and a list of the affected organisations.” It’s not the first time that Singaporean authorities have issued warnings that have implicated Bitcoin and crypto. In January, the CSA and SPF, in a joint advisory, suggested that people should use hardware wallets in an effort to guard against crypto-related malware and phishing attacks. A number of weeks prior to that, Singapore’s former Prime Minister, Lee Hsien Loong, took to Facebook to issue a warning with regard to a crypto scam that involved the use of deceptive content generated using artificial intelligence (AI). Mitigation techniquesBusinesses are being urged by the authorities to adopt best practices to mitigate the Akira ransomware threat. They suggest the implementation of a recovery plan alongside the use of multi-factor authentication (MFA) in order to secure data and the access to that data.  They also suggest filtering network traffic as it helps in identifying and blocking malicious activities. Meanwhile, disabling unused ports and hyperlinks curbs the risk further as it reduces the attack surface. Lastly, the authorities suggested the use of system-wide encryption to protect data even if it is accessed by unauthorized entities.

news
Loading