Результатов: 44
Фото:

Microsoft: Russian government hackers are targeting IoT devices

Microsoft today warned that Russian government hackers have been using video decoders, printers, and internet of things devices to breach computer networks. In a blog post, the Microsoft Threat Intelligence Center wrote that the “devices became points of ingress from which the actor established a presence on the network and continued looking for further access. дальше »

2019-8-6 03:36


Data Breach Report From Instagram Raises Concerns About Upcoming Facebook’s Digital Currency

Facebook, the most popular social network in the world, has been affected by different data leaks over the last years. This has harmed users and individuals that had data stored on their platform. Now, the security researcher Anurag Sen discovered that there was a public Amazon Web Services (AWS) database that had the information of […] дальше »

2019-5-21 18:33


Zcash Fixes And Discloses Vulnerabilities That Would Allow For Infinite ZEC Counterfeiting

The Zcash team has recently discovered and fixed a huge vulnerability of its system. Now, the team explained all about it on its official site. This vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print infinite ZEC […] дальше »

2019-2-6 04:52


New Mac Malware Can Steal Crypto from Exchanges, Can it be Prevented?

Unit 42, the global threat intelligence team at Palo Alto Network, discovered Mac malware that can steal cookies linked to crypto exchanges and wallets. Although usernames and passwords may not be sufficient to initiate withdrawals at crypto exchanges, if hackers manage to steal a combination of login credentials, web cookies, authentication cookies, and SMS data, it could steal user funds. дальше »

2019-2-2 21:32


Discredited Tron Accelerator to spawn more gambling dApps on Justin Sun’s network

Taking a break from the ongoing NiTROn 2019 conference, TRON foundation took to Medium to update the community on the TRON Accelerator situation. TRON was heavily criticized for certain issues that were previously discovered by the community regarding TRON Accelerator, project’s native development motivation program. дальше »

2019-1-19 11:49


Фото:

Starwood breach affecting 500M users reportedly part of a larger Chinese state-sponsored attack

Remember that massive breach of the Mariott-owned Starwood hotel chain from last month, which saw 500 million users’ data stolen? The New York Times reports that the intrusion was part of a larger state-sponsored intelligence-gathering effort spurred on by China‘s spy agency, the Ministry of State Security. дальше »

2018-12-12 09:46


Фото:

Starwood breach affecting 500m users reportedly part of a larger Chinese state-sponsored attack

Remember that massive breach of the Mariott-owned Starwood hotel chain from last month, which saw 500 million users’ data stolen? The New York Times reports that the intrusion was part of a larger state-sponsored intelligence-gathering effort spurred on by China‘s spy agency, the Ministry of State Security. дальше »

2018-12-12 09:46


Фото:

Ethereum Vulnerability Could Have Allowed Attackers to Drain Hot Wallets

A recent vulnerability in the Ethereum network could have reportedly allowed hackers to gain massive profits from cryptocurrency exchanges which haven’t set up a Gas usage limit. A Critical Vulnerability A group of researchers discovered a vulnerability in Ethereum which allowed attackers to drain exchanges by burning their ETH on high transaction costs or to benefit directly by minting GasToken. дальше »

2018-11-27 02:00


Фото:

Security Researchers Discover Sophisticated Twitter Crypto Botnet

On August 6, 2018, two security researchers at Duo Security who were studying Twitter automation patterns, stumbled upon a vast network of Twitter bot accounts promoting crypto fraud. The sophisticated network was accidentally discovered while the researchers were looking into how to create a methodology for accurately identifying Twitter bots. дальше »

2018-8-8 00:00


Фото:

Tron (TRX) Foundation Hands Over Bug Bounty Program to HackerOne

The Tron (TRX) Foundation had a Mainnet Bug Bounty program aimed at rewarding developers who discovered potential technical vulnerabilities in the Tron Mainnet. Through this project, the Tron Foundation was hoping to attract global leaders in network security so as to sustain the Tron mainnet and make it the most secure and stable public blockchain in […] The post Tron (TRX) Foundation Hands Over Bug Bounty Program to HackerOne appeared first on Ethereum World News. дальше »

2018-7-15 16:52