Новости о Hardware Attacks [ Фото новости ] [ Свежие новости ] | |
Trezor Safe devices still vulnerable to physical supply chain attacks, Ledger says
Trezor’s latest hardware wallets feature secure elements but are still vulnerable to attacks targeting their microcontrollers, Ledger claims. In the constantly shifting world of crypto security, even the most advanced hardware wallets aren’t immune to emerging threats. Now, cybersecurity experts… дальше »
2025-3-13 11:50 | |
|
|
Trezor’s Multi-Layer Defense Against Supply Chain Attacks
The official blog for Trezor, the world’s first hardware wallet. All you need to keep your digital assets safe. - Medium дальше »
2025-3-12 12:18 | |
|
|
Hackers target Trezor crypto wallet users after mailing list got compromised
Hardware cryptocurrency wallet manufacturer Trezor has divulged that its customers are being targeted by so-called “phishing” attacks after Mailchimp, the firm’s email automation service provider, was “compromised by an insider targeting crypto companies. дальше »
2022-4-5 03:30 | |
|
|
Ledger Reveals 3 Month Policy for Keeping Buyer Info; 2,000 New Users Affected in Data Breach
This time the information was leaked by the hardware wallet’s e-commerce provider Shopify’s rogue employees. But “these attacks have only strengthened our resolve to build and release products that keep you and your crypto safe,” says Ledger. дальше »
2021-1-15 23:34 | |
|
|
A Christmas Gift for Ledger Users – Death Threats
A wave of attacks aimed at Ledger hardware wallet owners is coming to light. Unfortunately, this offensive has not been limited to a few phishing emails — some customers are reporting ransom attempts and even death threats. дальше »
2020-12-23 10:58 | |
|
|
Hacked Ledger Database Dumped on Raidforums Making Way For Phishing Attacks
Crypto Twitter was buzzing after a leak in the database of Ledger’s hardware wallet today, consisting of more than 270,000 physical addresses and phone numbers and a million email addresses, made available on the hacker’s site, Raidforums. дальше »
2020-12-21 15:00 | |
|
|
Hardware Wallets Trezor And KeepKey Face Potential ‘Man-in-the-Middle’ Ransomware Attacks
According to a Medium blog post by ShiftCrypto, a rival to the hardware wallet manufacturers, the older versions of Trezor and KeepKey face a possible remote ransomware attack when users are entering their passphrases on desktops and mobile phones. дальше »
2020-9-3 15:11 | |
|
|
BitMEX Refunds Traders After Latest DDoS Attacks
Ever since the shock Bitcoin crash on Mar 13 when BitMEX went offline due to “hardware issues,” users have been awaiting an explanation. Well, today, they got them. However, “subject to two distributed denial-of-service (DDoS) attacks” isn’t convincing many. дальше »
2020-3-17 14:00 | |
|
|
Hardware Glitch Renders KeepKey Helpless to Physical Brute Force Attacks
Kraken, a leading digital asset exchange, found a hardware vulnerability in ShapeShift’s KeepKey wallet, allowing a variable flow of voltage to bypass the pin code required to open the wallet. KeepKey customers are advised to ensure nobody else has physical access to their wallet, and to enable a BIP 39 passphrase to reduce vulnerability, DecemberRead MoreRead More. дальше »
2019-12-12 22:00 | |
|
|
Kraken Security Labs Discovers ShapeShift’s KeepKey Crypto Wallet Can Be Hacked Easily For $75
KeepKey hardware wallets are affected by a flaw that would make them vulnerable to attacks if a hacker has access to the device for around 15 minutes. This is according to a recent report released by Kraken Security Labs and published in a blog post on December 10. дальше »
2019-12-10 21:09 | |
|
|
Google’s Titan Security Keys are now available to G Suite users
Google has just announced several updates to its enterprise cloud platform with an aim to improve users, data, and app security. The new enhancements were unveiled at Google Cloud Next ’19 conference in Tokyo this week. дальше »
2019-8-1 10:31 | |
|
|
New cryptocurrency mining malware is spreading across Thailand and the US
With the infamous cryptocurrency mining script Coinhive now offline, you’d be forgiven for thinking crypto-jacking was a thing of the past. Sadly though, security researchers have uncovered a new malware family that’s attacking hardware to get it to secretly mine cryptocurrency. дальше »
2019-6-4 15:50 | |
|
|
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
|
|
Ledger Reveals Physical Exploits Against Trezor Hardware Wallets
The battle of the hardware wallets is heating up. At this weekend’s MIT Bitcoin Expo in Boston, Charles Guillmet, Chief Security Officer of Ledger, presented a number of physical attacks that could be executed against Trezor hardware wallets. дальше »
2019-3-12 05:30 | |
|
|
Phishing Scammers: Trezor Cryptocurrency Hardware Wallet Action
Trezor, a hardware wallet for storing a vast array of digital assets including bitcoin (BTC) and litecoin (LTC) has released an official statement concerning the recent phishing attacks on its electronic shops, products, as well as websites of its affiliated partners, according to a Medium blog post on February 13, 2019. дальше »
2019-2-15 20:00 | |
|
|
US-Based Tech Company Sheds Light Into Alleged Attack of its Crypto Wallet
Tech Startup Reveals Details Regarding Previous Attacks, Releases Various Updates U. S. -based tech company Bitfi witnessed scrutiny following the launch of its hardware wallet and bounty program. дальше »
2019-2-1 14:41 | |
|
|
BetterHash Protocol Lets Pool Miners Regain Control Over Their Hash Power
One problem that concerns many is the centralization of mining within the Bitcoin ecosystem. Fortunately, there are talented developers working to solve this problem and Matt Corallo, full-time Bitcoin developer at Chaincode Labs, is one of them. дальше »
2019-1-26 23:50 | |
|
|
A Prehistory of the Ethereum Protocol
Although the ideas behind the current Ethereum protocol have largely been stable for two years, Ethereum did not emerge all at once, in its current conception and fully formed. Before the blockchain has launched, the protocol went through a number of significant evolutions and design decisions. дальше »
2018-7-21 23:03 | |
|
|
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
|
|
Bitmain Nears 51% of Network Hash Rate: Why This Matters and Why It Doesn’t
Recent Bitcoin block data shows that Bitcoin’s mining pools BTC. com, AntPool and ConnectBTC, respectively mined about 25. 7 percent, 16. 1 percent and 0. 2 percent of all new blocks over the past week. дальше »
2018-6-29 23:07 | |
|
|
Equihash Algorithm Cryptocurrencies May face attacks by ASIC Miners : Let’s study about it.
In the case of currencies using the Equihash algorithm, it seems a large amount of the combined hashrate is provided by ASIC hardware. It’s a worrisome development which could introduce a lot more 51% attacks in the future. дальше »
2018-6-18 08:21 | |
|
|











