2020-4-20 19:00 |
DForcel is believed to have suffered an attack targeting the same vulnerability that allowed $300,000 in tokenized BTC to be stolen from Uniswap
Similar to Notcoin - Blum - Airdrops In 2024
2020-4-20 19:00 |
DForcel is believed to have suffered an attack targeting the same vulnerability that allowed $300,000 in tokenized BTC to be stolen from Uniswap
Similar to Notcoin - Blum - Airdrops In 2024
Apple has patched a zero-day flaw in iTunes app for Windows that allowed hackers to escape detection and install BitPaymer ransomware. The findings — disclosed by cybersecurity firm Morphisec — come as Apple killed iTunes for macOS, replacing it with Music, Podcasts, and TV apps in macOS Catalina.
2019-10-11 13:40 | |
A major flaw in an Indian local search app, Justdial, allowed hackers to log in to any of its 156 million users accounts. Apart from accessing user information such as names, phone numbers, and email addresses, the vulnerability allowed them to peek into financial details including balance and transactions of an account through JustDial Pay, the company’s payment service.
2019-10-10 08:44 | |
You better update WhatsApp right now. A researcher has discovered a nasty vulnerability in the Facebook-owned privacy-oriented messenger that made it possible to for attackers to gain access to your files and messages up an exploit vector that attackers can abuse to obtain access to your device.
2019-10-2 16:08 | |
On August 30, software programmer Rusty Russell announced that he had found a major security vulnerability in various lightning projects that could have allowed attackers to strip users off their money.
2019-9-28 17:03 | |
The company behind niche cryptocurrency Zcash is urging the network to upgrade node software to the latest version immediately, as it contains an “important security fix. ” “Users should upgrade their nodes to [version 2.
2019-9-26 17:47 | |
WhatsApp, the messaging app used by more than 1. 5 billion worldwide, says it’s patched a critical security vulnerability which allowed attackers to secretly infect phones with malicious spyware by just calling phone numbers over an in-app audio call.
2019-5-14 14:18 | |
A high severity bug on the TRON network could have allowed an attacker with a single computer to crash the network, as first reported by TNW. The fault stems from a vulnerability related to spamming smart contracts.
2019-5-7 11:10 | |
Stellar has come under fire for its treatment of an inflation bug that occurred almost two years ago. This week, Messari Research issued a report indicating that in 2017, Stellar “quietly patched” a major vulnerability that allowed an attacker to freely create millions of dollars worth of Stellar Lumens (XLM).
2019-3-30 18:52 | |
CCN earlier reported that Coinomi wallet had a confirmed bug that allowed Google to view the details of a user’s seed phrase. The seed phrase generates a wallet. Coinomi uses a 24-word phrase. It enables a user to regenerate their wallet on any platform, and maintain a simultaneous wallet on their phone and on their desktop.
2019-2-28 10:48 | |
Zcash has been in the news recently for all the wrong reasons. Their team discovered and fixed a huge vulnerability of its system. Following that they said that vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print […]
2019-2-6 18:36 | |
The Zcash team has recently discovered and fixed a huge vulnerability of its system. Now, the team explained all about it on its official site. This vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print infinite ZEC […]
2019-2-6 04:52 | |
On January 26, 2019, clients of peer-to-peer bitcoin trading service LocalBitcoins were the targets of a phishing scam which resulted in the theft of a handful of bitcoins.
2019-1-31 18:40 | |
Earlier this week, the highly-anticipated Ethereum (ETH) hard fork event – dubbed Constantinople – was delayed just one day before its scheduled event time due to the discovery of a significant security vulnerability that, if it were to have been implemented, would have allowed nefarious actors to steal user’s funds.
2019-1-18 21:04 | |
Researchers recently identified vulnerabilities in cryptographic signatures for Bitcoin, Ethereum, and Ripple, that allowed attackers to calculate private keys and, consequently, steal any crypto in that wallet.
2019-1-12 22:11 | |
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server.
2019-1-4 21:11 | |
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack.
2019-1-1 19:15 | |
A recent vulnerability in the Ethereum network could have reportedly allowed hackers to gain massive profits from cryptocurrency exchanges which haven’t set up a Gas usage limit. A Critical Vulnerability A group of researchers discovered a vulnerability in Ethereum which allowed attackers to drain exchanges by burning their ETH on high transaction costs or to benefit directly by minting GasToken.
2018-11-27 02:00 | |
A critical vulnerability in an Ethereum token made it possible for malicious actors to force cryptocurrency exchange desks to spend extremely high fees on transactions. Even worse, the attackers could abuse the bug for profit.
2018-11-22 13:55 | |
Security firm Imperva found a bug in May that allowed websites to read Facebook users and their friends’ private information. The troubling vulnerability let a site access users’ likes and interests through a manipulated Facebook Graph query.
2018-11-14 09:24 | |
This Friday the Guardian reported that nearly 50 million users’ accounts were compromised. According to Facebook the breach was discovered on September 25th and patched two days later. However, the vulnerability allowed hackers to gain sensitive information about users’ accounts, such as photos, private conversations, and the ability to log into any other apps using […] The post Facebook Hacked – What Information Was Compromised? appeared first on NullTX.
2018-10-2 07:41 | |
Bitcoin Core developers acknowledged a potentially devastating vulnerability in the code of the original cryptocurrency and appealed to miners to upgrade to their newly issued patch with immediate effect.
2018-9-23 07:56 | |
For well over a year, versions of Bitcoin Core — Bitcoin’s leading software implementation — contained a severe software bug. The bug was fixed with Bitcoin Core 0.
2018-9-22 21:22 | |
Like any technology, Bitcoin is always improving to achieve better results. The Bitcoin Core team has released a new patch this week, which fixed a vulnerability in the system that could be fatal to the network, as it allowed for DDoS attacks.
2018-9-21 19:44 | |
Cryptocurrency industry and community figures are reacting after it emerged a Bitcoin Core developer fixed a “critical” bug in the code for the Bitcoin Cash hard fork. Fields: Bug ‘Would Have Split’ Chain In a blog post August 10th, Corey Fields relates how in April 2018 he anonymously reported the consensus bug, known as SIGHASH_BUG.
2018-8-10 16:00 | |
The bug would have allowed a malicious user to inject misleading data into the predictions platform.
2018-8-9 14:36 | |
The Next Web’s in-house cryptocurrency column recently reported that Monero, the foremost privacy-centric cryptocurrency, was subject to a relatively minor cybersecurity vulnerability. According to the technology news outlet, “inventive” hackers could create false transaction data via the copying of a simple line of code from the Monero wallet code base, which is open-sourced and easily […] The post Monero Glitch Allowed Hackers To Steal XMR From Exchanges appeared first on Ethereum World News.
2018-8-3 06:14 | |
It appears popular cryptocurrency Monero, often praised for its privacy functions, was riddled with security vulnerabilities – one of which allowed hackers to steal coins directly from the wallets of exchange desks.
2018-8-2 15:16 | |
Visitors to the Etherscan. io website were panicking on Monday when faced with a pop-up indicating that the site had been hacked. The popular Ethereum blockchain-explorer quickly fixed the breach and no data was compromised — this time.
2018-7-26 22:00 | |
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers.
2018-7-18 23:18 | |
Since its invention, a recurring question for cryptocurrency holders has been how to best secure their digital assets. This question of security carries the greatest weight when one understands the stakes of holding unprotected cryptocurrency — vulnerability to hackers.
2018-7-6 03:51 | |