2020-7-17 22:46 |
While the crypto wallets associated with the scam registered over 400 transactions, the attackers seem to have made away with a relatively small haul.
Similar to Notcoin - Blum - Airdrops In 2024
2020-7-17 22:46 |
While the crypto wallets associated with the scam registered over 400 transactions, the attackers seem to have made away with a relatively small haul.
Similar to Notcoin - Blum - Airdrops In 2024
Private transactions cryptocurrency PIVX is vulnerable to a bug allowing the attacker to obtain unfairly high staking rewards
2019-8-14 19:06 | |
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.
2019-6-14 04:03 | |
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2.
2019-5-25 21:56 | |
Global payment processing platform PayPal has been awarded a patent for a technique that can help with the timely detection and reduction of ransomware attacks. Ransomware attacks are a form of malware that takes over the victim's computer, locks up the files therein and demands a ransom before the files can be accessed again — often to be paid in cryptocurrency.
2019-4-19 21:17 | |
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack.
2019-1-1 19:15 | |
A critical vulnerability in an Ethereum token made it possible for malicious actors to force cryptocurrency exchange desks to spend extremely high fees on transactions. Even worse, the attackers could abuse the bug for profit.
2018-11-22 13:55 | |
A bug centering around a new Ethereum token, GasToken, which was enabling abuse on cryptocurrency exchanges, appears to have been resolved. The details are provided in a report originally published on November 13, 2018, that discussed how the bug was exploited by attackers, and what digital platforms could do if they wished to protect their hot wallet funds.
2018-11-22 00:34 | |
Hackers are believed to have stolen hundreds of thousands of dollars worth of EOS cryptocurrency from blockchain-powered gambling dApp EOSBet — again. Thieves have exploited another vulnerability in the automated dice game, allegedly taking at least $338,000 from its operational wallets.
2018-10-15 16:38 | |
Based on blockchain technology, most cryptocurrencies have an open and public ledger of transactions. While this is required for these system to work, it comes with a significant downside: privacy is often quite limited.
2018-9-25 19:47 | |
Here we go again with more EOS troubles: the popular cryptocurrency purportedly suffers from a major vulnerability that makes it possible to steal valuable network resources directly from user accounts – without any authorization.
2018-8-27 14:24 | |
Remember John McAfee’s supposedly “unhackable” cryptocurrency wallet? It appears a group of researchers is about to prove the once-lauded antivirus pioneer wrong. After cracking the so-called Bitfi wallet to play legendary game DOOM on it, today the researchers were able to successfully send signed transactions with the device – that is despite the “security” mechanisms Bitfi has in place to prevent attackers from doing that.
2018-8-13 19:38 | |
It appears popular cryptocurrency Monero, often praised for its privacy functions, was riddled with security vulnerabilities – one of which allowed hackers to steal coins directly from the wallets of exchange desks.
2018-8-2 15:16 | |
The following is a diagram from a slide that I made in one of my presentations at Cornell this week: </img> If there was one diagram that could capture the core principle of Casper’s incentivization philosophy, this might be it.
2018-7-21 23:03 | |
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers.
2018-7-18 23:18 | |
Just days prior to launch, EOS had also seen serious bugs raised by a Chinese internet security firm that required urgent patches to be issued. The report said that loopholes in EOS’ code could expose nodes to attackers, giving them the ability to possibly take “full control” of transactions. In its assessment, the CCID blockchain research team
2018-6-25 20:34 | |