Результатов: 313
Фото:

Loopring suffers $5 million loss after hacker exploits 2FA vulnerability

Loopring, a decentralized finance (DeFi) protocol built on Ethereum, recently experienced a significant security breach that resulted in a $5 million loss. The attack exploited a vulnerability in Loopring’s Guardian two-factor authentication (2FA) service, which is designed to enhance the security of its smart wallet application. дальше »

2024-6-11 12:00


Колин Ву: Bybit открыла регистрацию для китайских пользователей

Криптовалютная биржа Bybit, по-видимому, начала оказывать услуги в материковом Китае, который входит в список исключенных юрисдикций для платформы. Exclusive: The third largest offshore exchange Bybit suddenly opened up registration and authentication for users in China. дальше »

2024-6-6 12:22


10 Decentralized Applications Integrate Sui’s Groundbreaking “zkLogin” Google Authentication

Gaming, Ecommerce and DeFi applications are leveraging Sui’s singular social authentication to eliminate the biggest hurdle blocking mainstream audiences from web3. Sui, the rapidly ascending Layer-1 blockchain created by the leaders of Facebook’s Diem project, today announced that over 10 decentralized applications (dApps) in the Sui ecosystem have integrated zkLogin, the first-of-its-kind primitive that makes … Continued The post 10 Decentralized Applications Integrate Sui’s Groundbreaking “zkLogin” Google Authentication appeared first on BeInCrypto. дальше »

2024-1-25 17:00


Vitalik Buterin sim-swap hack exposes Twitter Blue account security flaw

Ethereum co-founder Vitalik Buterin confirmed that his X (formerly Twitter) account was breached via a sim-swap attack, according to a Sept. 11 post on Warpcast. A sim-swap attack is a scheme that exploits a vulnerability in specific two-factor authentication methods, where a phone call or text message serves as the second authentication step. дальше »

2023-9-12 17:00


Part 4: Genesis of Ledger Recover – Controlling Access to the Backup: Identity Verification

How can Ledger Recover protect the entropy of a Secret Recovery Phrase without just introducing yet another additional mechanism secret-based such as a password, a two-factor authentication or similar? In this section, we will delve into Identity Verification mechanisms which provide access to your backup by yourself and only you. дальше »

2023-9-8 16:04


SIMBA Chain and Alitheon Partner to Deliver End-to-End Authentication & Verification

South Bend, Indiana, 23rd February, 2023, Chainwire SIMBA Chain, the builder of Blocks, an enterprise-grade platform that abstracts the complexities of blockchain development to make the innovative technology more accessible across multiple blockchains and services, today announces the integration of Alitheon, the provider of FeaturePrint®, the machine-vision-based solution for authentication and traceability of physical goods. дальше »

2023-2-23 17:00


Фото:

An In-depth Overview of How the Blockchain Can Revolutionize International Trade

International trade relies on structured platforms and process authentication requirements that determine equal value exchange between entities in different regions. We look at how blockchain technology can revolutionize the existing ecosystem and enable efficient trader engagement by deploying relevant protocols.… дальше »

2022-9-28 17:00


REV3AL – NFT and Digital Asset Authentication Technology Launches on KuCoin June 30th

REV3AL, a new and innovative cryptocurrency project, comes at a critical time in the crypto sector when scams and fraud are on the rise. As a solution to the hindering growth of the digital media market, REV3AL offers digital copyright protection and anti-counterfeiting solutions for artists, creators, and intellectual property owners. дальше »

2022-6-29 13:15