cryptocurrency

Bitcoin Security Rectifier app aims to make Bitcoin more secure
A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

Are NFTs safe? 3 things you should know before you buy
NFTs, or non-fungible tokens, have captured the attention (and wallets) of consumers and businesses around the world. This is largely in part to the big price-tag sales, such …

With more than 400,000 crypto scams created in 2020, increase of 75% predicted for 2021
The findings of a Bolster report, along with real life examples, clearly correlate the rise in crypto scams to the value and popularity of cryptocurrencies as well as the …

A massive increase in eCrime behavior can easily disrupt business operations
During 2019, financially motivated cybercrime activity occurred on a nearly continuous basis, according to a CrowdStrike report. There was an increase in incidents of …

2019 experienced massive spate of crypto crimes, $4.4 billion to date
With only seven months left for nations to pass laws and virtual asset service providers (VASPs) to comply with the guidelines, the majority of cryptocurrency exchanges are …

Monero Project site compromised, served malware-infected binaries
The official website of the Monero Project has been compromised to serve a malware-infected version of the CLI (command-line interface) wallet. The malicious file was …

Thefts from cryptocurrency exchanges continue despite increased security
Although exchanges, wallets and other cryptocurrency custody services are strengthening their defenses, attackers continue to innovate and outpace even the current state of …

Ransomware and malware attacks decline, attackers adopting covert tactics
There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally, according to the latest report released by Microsoft. …

A wave of regulation is coming to the cryptocurrency economy
There is a concerning trend of cross-border crypto payments leaving U.S. exchanges and entering offshore and untraceable wallets, a CipherTrace report reveals. In the twelve …

Research on private key generation reveals theft of ETH funds from accounts with discoverable keys
Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE …

The correlation between DDoS attacks and cryptomining
There is a direct correlation between cryptocurrency and DDoS attacks. As the price of cryptocurrency dropped in 2018, leading to decreased profits from cryptomining, hackers …

What is shadow mining and why is it a security threat?
The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility