Новости о Allowed Vulnerability [ Фото новости ] [ Свежие новости ] | |
PSA: Update WhatsApp now to prevent spyware from being installed on your phone
WhatsApp, the messaging app used by more than 1. 5 billion worldwide, says it’s patched a critical security vulnerability which allowed attackers to secretly infect phones with malicious spyware by just calling phone numbers over an in-app audio call. дальше »
2019-5-14 14:18 | |
|
|
Bug on TRON could have allowed a single computer to crash the network
A high severity bug on the TRON network could have allowed an attacker with a single computer to crash the network, as first reported by TNW. The fault stems from a vulnerability related to spamming smart contracts. дальше »
2019-5-7 11:10 | |
|
|
Research Firm Says Stellar Under-Publicized a $2.2 Billion Bug In 2017
Stellar has come under fire for its treatment of an inflation bug that occurred almost two years ago. This week, Messari Research issued a report indicating that in 2017, Stellar “quietly patched” a major vulnerability that allowed an attacker to freely create millions of dollars worth of Stellar Lumens (XLM). дальше »
2019-3-30 18:52 | |
|
|
Coinomi Addresses Spellcheck Vulnerability, Accuses Victim of Bitcoin Extortion
CCN earlier reported that Coinomi wallet had a confirmed bug that allowed Google to view the details of a user’s seed phrase. The seed phrase generates a wallet. Coinomi uses a 24-word phrase. It enables a user to regenerate their wallet on any platform, and maintain a simultaneous wallet on their phone and on their desktop. дальше »
2019-2-28 10:48 | |
|
|
Edward Snowden Shows Support of Zcash (ZEC) Despite Recent Controversies
Zcash has been in the news recently for all the wrong reasons. Their team discovered and fixed a huge vulnerability of its system. Following that they said that vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print […] дальше »
2019-2-6 18:36 | |
|
|
Zcash Fixes And Discloses Vulnerabilities That Would Allow For Infinite ZEC Counterfeiting
The Zcash team has recently discovered and fixed a huge vulnerability of its system. Now, the team explained all about it on its official site. This vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print infinite ZEC […] дальше »
2019-2-6 04:52 | |
|
|
Phishing Scam Hits LocalBitcoins, Clients Lose Funds
On January 26, 2019, clients of peer-to-peer bitcoin trading service LocalBitcoins were the targets of a phishing scam which resulted in the theft of a handful of bitcoins. дальше »
2019-1-31 18:40 | |
|
|
Ethereum Constantinople Hard Fork Scheduled for Late February Following Recent Delay
Earlier this week, the highly-anticipated Ethereum (ETH) hard fork event – dubbed Constantinople – was delayed just one day before its scheduled event time due to the discovery of a significant security vulnerability that, if it were to have been implemented, would have allowed nefarious actors to steal user’s funds. дальше »
2019-1-18 21:04 | |
|
|
Researchers Find Vulnerability for Bitcoin, Ethereum, and Ripple Digital Signatures in Faulty Implementations
Researchers recently identified vulnerabilities in cryptographic signatures for Bitcoin, Ethereum, and Ripple, that allowed attackers to calculate private keys and, consequently, steal any crypto in that wallet. дальше »
2019-1-12 22:11 | |
|
|
Neutrino: A Privacy-Preserving Light Wallet Protocol
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server. дальше »
2019-1-4 21:11 | |
|
|
Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »
2019-1-1 19:15 | |
|
|
Ethereum Vulnerability Could Have Allowed Attackers to Drain Hot Wallets
A recent vulnerability in the Ethereum network could have reportedly allowed hackers to gain massive profits from cryptocurrency exchanges which haven’t set up a Gas usage limit. A Critical Vulnerability A group of researchers discovered a vulnerability in Ethereum which allowed attackers to drain exchanges by burning their ETH on high transaction costs or to benefit directly by minting GasToken. дальше »
2018-11-27 02:00 | |
|
|
Vulnerability in Ethereum token allowed hackers to suck exchanges dry
A critical vulnerability in an Ethereum token made it possible for malicious actors to force cryptocurrency exchange desks to spend extremely high fees on transactions. Even worse, the attackers could abuse the bug for profit. дальше »
2018-11-22 13:55 | |
|
|
Facebook bug allowed websites to grab unsuspecting users’ personal data
Security firm Imperva found a bug in May that allowed websites to read Facebook users and their friends’ private information. The troubling vulnerability let a site access users’ likes and interests through a manipulated Facebook Graph query. дальше »
2018-11-14 09:24 | |
|
|
Facebook Hacked – What Information Was Compromised?
This Friday the Guardian reported that nearly 50 million users’ accounts were compromised. According to Facebook the breach was discovered on September 25th and patched two days later. However, the vulnerability allowed hackers to gain sensitive information about users’ accounts, such as photos, private conversations, and the ability to log into any other apps using […] The post Facebook Hacked – What Information Was Compromised? appeared first on NullTX. дальше »
2018-10-2 07:41 | |
|
|
Critical Bug Would Have Allowed Hackers to Create Bitcoin, Detector Hints at Sabotage
Bitcoin Core developers acknowledged a potentially devastating vulnerability in the code of the original cryptocurrency and appealed to miners to upgrade to their newly issued patch with immediate effect. дальше »
2018-9-23 07:56 | |
|
|
New Bitcoin Core Patch Fixes Vulnerability To DDoS Attacks, Devs Talk Of Possible Chainsplit
Like any technology, Bitcoin is always improving to achieve better results. The Bitcoin Core team has released a new patch this week, which fixed a vulnerability in the system that could be fatal to the network, as it allowed for DDoS attacks. дальше »
2018-9-21 19:44 | |
|
|
Bitcoin Core Developer Reveals ‘Critical’ Bug in Bitcoin Cash
Cryptocurrency industry and community figures are reacting after it emerged a Bitcoin Core developer fixed a “critical” bug in the code for the Bitcoin Cash hard fork. Fields: Bug ‘Would Have Split’ Chain In a blog post August 10th, Corey Fields relates how in April 2018 he anonymously reported the consensus bug, known as SIGHASH_BUG. дальше »
2018-8-10 16:00 | |
|
|
Monero Glitch Allowed Hackers To Steal XMR From Exchanges
The Next Web’s in-house cryptocurrency column recently reported that Monero, the foremost privacy-centric cryptocurrency, was subject to a relatively minor cybersecurity vulnerability. According to the technology news outlet, “inventive” hackers could create false transaction data via the copying of a simple line of code from the Monero wallet code base, which is open-sourced and easily […] The post Monero Glitch Allowed Hackers To Steal XMR From Exchanges appeared first on Ethereum World News. дальше »
2018-8-3 06:14 | |
|
|
Monero wallet vulnerability made it possible to steal XMR from exchanges
It appears popular cryptocurrency Monero, often praised for its privacy functions, was riddled with security vulnerabilities – one of which allowed hackers to steal coins directly from the wallets of exchange desks. дальше »
2018-8-2 15:16 | |
|
|
Etherscan Block-Explorer Hit by ‘Harmless’ Hack
Visitors to the Etherscan. io website were panicking on Monday when faced with a pop-up indicating that the site had been hacked. The popular Ethereum blockchain-explorer quickly fixed the breach and no data was compromised — this time. дальше »
2018-7-26 22:00 | |
|
|
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
|
|
How Peter Kroll’s Paper Wallet Protects Cryptocurrency
Since its invention, a recurring question for cryptocurrency holders has been how to best secure their digital assets. This question of security carries the greatest weight when one understands the stakes of holding unprotected cryptocurrency — vulnerability to hackers. дальше »
2018-7-6 03:51 | |
|
|


















