Attacker - Свежие новости [ Фото в новостях ] | |
Target blames Bitcoin scam tweet on third-party app, not Twitter
American retail behemoth Target has come out to clarify that a tweet it posted, containing a link to a Bitcoin giveaway scam, came from a third-party software provider – not Twitter. In an email to Hard Fork, a company spokesperson said – contrary to what it suggested previously – Target’s Twitter account was never inappropriately accessed. дальше »
2018-11-15 14:12 | |
|
|
Latest Crypto Mining Malware Viruses Cridex and Gozi Reinvent Themselves to Target Exchanges
A new computer virus that spread all over the web is threatening Switzerland. The virus allows the attacker to mine Monero (XMR) using the victim’s CPU power. This kind of virus was ranked as the sixth most significant malware to hit Switzerland during the first half of 2018. The information was released in a paper […] дальше »
2018-11-10 06:11 | |
|
|
Attacker pledges to make 51 percent attacks a spectator sport
After attacks on Verge and Bitcoin Gold, the vulnerability of many altcoins to 51 percent attacks has been highlighted again by an anonymous Tweeter who has revealed plans to live stream attacks of low hashrate coins дальше »
2018-10-15 14:00 | |
|
|
Mischief-Maker Promises to Livestream a 51% Altcoin Attack
“On Oct 13, 3:00 CDT I will be doing a 51% attack against the cryptocurrency Einsteinium,” began the call-to-arms. As promises go, this one was as bold as it was brazen. The anonymous attacker has promised to assume majority hashrate control of an altcoin to demonstrate how easy the process is. дальше »
2018-10-9 08:15 | |
|
|
Pigeoncoin Hacked for $15,000: May be a Warning Sign for Other Bitcoin Forks
A minor altcoin called Pigeoncoin has suffered a small-scale attack resulting in the theft of 235 million PGN tokens, worth approximately $15,000. Some have mocked the attacker’s modest gains, with ZDNet wryly headlining the story “Hacker wastes entire day only to make $15,000. дальше »
2018-10-9 01:36 | |
|
|
Blockstream’s Liquid Network Could Be Vulnerable to Hardware Backdoors
Bitcoin technology company Blockstream has conceded its flagship Liquid Network could be susceptible to hardware vulnerabilities. Following recent disclosures that certain Chinese-manufactured motherboards contain backdoors, Blockstream has authored a post conceding that such an exploit could allow an attacker to infiltrate their off-chain bitcoin transfer system. дальше »
2018-10-6 10:50 | |
|
|
Monero Releases Malware Response Group and Successfully Patches Burn Bug
Monero has officially released its Malware Response Workgroup website yesterday. In an effort to help protect Monero’s community, the website aims to provide resources to educate about the types of malware that may take advantage of users. дальше »
2018-9-29 23:18 | |
|
|
Facebook reveals data breach affecting 50 million users
Facebook today announced a data breach occurred on September 25 affecting at least 50 million Facebook accounts. The social network disclosed the breach Friday morning, issuing a statement that said an “attack” on its system led to “the exposure of information” affecting the 50 million users, according to the New York Times. дальше »
2018-9-28 20:09 | |
|
|
Monero Developers Disclose Catastrophic XMR-Burning Bug in Wallets
Monero developers just publicly disclosed a potentially devastating XMR-burning bug. If exploited, the bug would have allowed attackers to drain Monero from exchange wallets for the cost of a few transaction fees. дальше »
2018-9-26 02:03 | |
|
|
Devs disclose critical XMR-burning bug in Monero wallets
Monero developers have disclosed a major bug that could really have been nasty. Until now, attackers could have drained Monero from exchanges (or any organizational wallet), all for the cost of a few transaction fees. дальше »
2018-9-25 19:10 | |
|
|
Crypto Wallet Protection App Wants to Secure Your Wallets Against Malware
Malware, a persistent thorn in the side of the internet’s wider community, has become an increasing concern for cryptocurrency users. A problem that comes in many forms, malicious software is leveraged by hackers to rob community members of their funds. дальше »
2018-9-18 23:37 | |
|
|
EOS Announces Solution to Counter-Reply any RAM-Steal Attacker: EOS/USD Breaks $5.00
The fifth largest coin by market capitalization is welcoming much gain after the roller-coaster pathway that the cryptocurrencies experienced the last days. Only behind MIOTA’s strong 15. 00% increase in the last 24-hours, EOS has jumped upwards for 4. дальше »
2018-8-27 13:05 | |
|
|
North Korean Hackers Set Sights on Crypto Traders Using Trojanized Trading Software
A new report from Kaspersky Labs reveals that North Korean hackers are now using their ‘Lazarus’ trojan to hack cryptocurrency traders and exchanges. Typically used for conducting political interference, “Lazarus has been a major threat actor in the APT arena for several years,” Securelist reports. дальше »
2018-8-25 23:11 | |
|
|
Intel’s Foreshadow CPU Bug Exposes SGX’s Sensitive Data, Crypto World on Notice
Security Flaw Exposed In Intels Software Guard Extensions On Tuesday, analysts discovered the Foreshadow vulnerability in Intel’s Software Guard Extensions (SGX). This vulnerability is defined as “a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third-party clouds.” There are two different approaches that this […] дальше »
2018-8-16 19:25 | |
|
|
A Guide to 99% Fault Tolerant Consensus
Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type). дальше »
2018-8-9 04:03 | |
|
|
A Prehistory of the Ethereum Protocol
Although the ideas behind the current Ethereum protocol have largely been stable for two years, Ethereum did not emerge all at once, in its current conception and fully formed. Before the blockchain has launched, the protocol went through a number of significant evolutions and design decisions. дальше »
2018-7-21 23:03 | |
|
|
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |
|
|
STARKs, Part II: Thank Goodness It's FRI-day
Special thanks to Eli Ben-Sasson for ongoing help and explanations, and Justin Drake for reviewing In the last part of this series, we talked about how you can make some pretty interesting succinct proofs of computation, such as proving that you have computed the millionth Fibonacci number, using a technique involving polynomial composition and division. дальше »
2018-7-21 23:03 | |
|
|
Survey: 45% of security professionals reuse the same password
There’s a saying — “practice what you preach. ” If you give advice, make sure it’s something you follow personally. Turns out, some security pros aren’t doing that. A survey of 306 infosec professionals at London’s Infosecurity Conference 2008 from Lastline showed that 45 percent commit one of the biggest security cardinal sins — reusing passwords across accounts. дальше »
2018-7-18 11:29 | |
|
|
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
|
|
New Malware Swaps Intended Crypto Addresses for the Hacker’s Own
Crypto users have been targeted by malware for years now. With crypto becoming increasingly popular, cyber criminals have continued to invent new and more advanced ways to steal them. And now there is a new one that swaps an intended crypto address for one that belongs to the attacker. While it’s not the first such […] дальше »
2018-7-5 01:00 | |
|
|
Bitcoin Cash [BCH] under attack: An individual vs investors!
An unknown engineer is debilitating to strike the Bitcoin Cash [BCH] coordinated with a progression of spam attacks that the attacker accepts to be sufficient enough to shake the system. The engineer had addressed individuals about his endeavor in the not-so-distant past, however, on June 22nd, the anonymous attacker said that the surge has begun and […] дальше »
2018-6-27 14:26 | |
|
|
16 arrested in Monero Japan on the Crytojacking case
Japanese prosecutors from 10 prefectures have arrested 16 individuals suspected of involvement in an ongoing criminal case of cryptojacking, local news outlet The Asahi Shimbun reports June 15. Cryptojacking is the practice of using unsuspecting users’ processing power in order to mine cryptocurrency for the attacker. According to the report by Asahi Shimbun, the arrested дальше »
2018-6-17 03:07 | |
|
|











