cryptocurrency

Dash invites researchers to hack their blockchain
Thousands of security researchers will be incentivized to identify critical software vulnerabilities within Dash’s code and present them to the Dash Core Team for remediation. …

Hacker grabs $30 million in ether through Parity multisig wallet flaw
Another day, another cryptocurrency heist: this time, the attacker has stolen some $30 million in ether (ETH – value token of the Ethereum blockchain) from a number of …

Bondnet botnet goes after vulnerable Windows servers
A botnet consisting of some 2,000 compromised servers has been mining cryptocurrency for its master for several months now, “earning” him around $1,000 per day. …

Will blockchain liability be similar to Bitcoin liability?
For many, Bitcoin is the de facto face of blockchain. The cryptocurrency Bitcoin has gained a sullied reputation for its nefarious use in criminal or black market …

Exploring trends in automated crypto trading
Despite the risks, many traders continue to be attracted to cryptocurrency trading due to the earning potential it offers. Sasha Ivanov, CEO of Waves, explains that the crypto …

Zcash mining software covertly installed on victims’ machines
Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …

Your Seagate Central NAS could be hosting mining malware
If you have discovered cryptocurrency mining malware on your system, have removed it, and got compromised again without an idea about how it happened, it could be that the …

$77 million in Bitcoin stolen from Bitfinex exchange
Popular Hong Kong-based cryptocurrency exchange Bitfinex has suffered a security breach that resulted in the theft of millions’ worth of Bitcoin. 119,756 BTC, to be exact, …

The DAO is under attack, a third of its ether reserves stolen
The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …

Playing Hearthstone? Want to cheat? You might end up with Bitcoin-stealing malware
It’s widely known that online gamers make great targets for cyber criminals: their dedication and enthusiasm for the game(s) often leads them to disregard warnings both …

Loanbase hacked via WordPress hole, funds stolen
Popular international Bitcoin crowd-lending platform Loanbase has suffered a security breach, and is currently offline. The breach was discovered on Saturday and made public …
Latest trends in the ransomware business
“Cybercrooks wielding ransomware might prefer getting paid in Bitcoin, but the crypto currency is just a way to obfuscate the real destination of the payment – as …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility