Exploit - Свежие новости [ Фото в новостях ] | |
Bitcoin Whales Are the Smart Money. Don’t Be the Dumb Money
By CCN: Owners of “whale wallets” scooped up 450,000 BTC as the bitcoin market hit bear-market lows in late 2018. It appears whales now control 25% of all BTC. Is this good or bad for bitcoin? Whales are smart money These private, non-institutional buyers decided an 85 percent decline was a buying opportunity. дальше »
2019-6-2 13:53 | |
|
|
Whales Could Pull Bitcoin Back To $20,000, Says Asset Manager
A small group of deep-pocketed traders has been able to exploit market sentiment and set the trajectory for crypto prices, according to one asset manager. Travis Kling, Founder and Chief Investment Officer at Ikigai Asset Management, believes that there could be sufficient momentum to take Bitcoin (BTC) past its all-time high. дальше »
2019-5-30 23:00 | |
|
|
NSA’s EternalBlue Exploit Cripples US City Infrastructures With Ease
Not too many people should be surprised to learn the EternalBlue hacking exploit is still making the rounds. After becoming a successful tool to deliver WannaCry and NotPetya ransomware, it now seems the exploit is being used to target major cities’ infrastructure. дальше »
2019-5-26 17:00 | |
|
|
Miners Exploit Recent Bug to Launch 51% Attack on the Bitcoin Cash Network
Bitcoin Cash recently upgraded its network to integrate the Schnorr Multisig feature. As good as the development was with the advantages of Schnorr, it led to a fault that would have cost Bitcoin Cash more than the advantages of Schnorr. дальше »
2019-5-25 15:20 | |
|
|
Infographic: An Overview of Compromised Bitcoin Exchange Events
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2. дальше »
2019-5-25 21:56 | |
|
|
Bitcoin Cash exploit cripples network during scheduled hardfork upgrade
A bug was reportedly exploited on Bitcoin Cash during a scheduled hardfork upgrade of the protocol. For an hour and a half transactions went unprocessed, causing fees to skyrocket. A source familiar with the project says the exploit “looks like a timed attack,” while other rumors are circulating that the “attacker” placed a 180,000 BCH short […] The post Bitcoin Cash exploit cripples network during scheduled hardfork upgrade appeared first on CryptoSlate. дальше »
2019-5-16 21:43 | |
|
|
BitDefender researchers discover terrifying security vulnerability in Intel CPUs
Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. дальше »
2019-5-14 19:59 | |
|
|
Hackers Exploit Confluence Vulnerability to Plant Crypto Mining Malware
As bitcoin (BTC) and other digital assets keep growing in value and use case, cyberpunks are also upping their game with each passing day, formulating new ways of enriching themselves with ‘dirty crypto. дальше »
2019-5-13 17:00 | |
|
|
FinCEN releases report on illegal activities concerning Bitcoin [BTC] and other cryptocurrencies
The Financial Crimes Enforcement Network [FinCEN] recently released guidance for money transmitter using digital currencies. Along with this, it also released a document titled ‘Advisory on Illicit Activity Involving Convertible Virtual Currency’ guiding institutions on how to identify and report “suspicious activity concerning how criminals and other bad actors exploit convertible virtual currencies”. дальше »
2019-5-10 18:45 | |
|
|
Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find
Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […] дальше »
2019-5-8 02:30 | |
|
|
Cornell Tech Research: Dangerous Arbitrage Bots Are Exploiting Decentralized Exchanges
There is a new trend in the market. People are using arbitrage bots to exploit innefficiencies in decentralized exchanges (DEX) in order to get more profit. This was originally reported by Homeland Security News Wire, which used research from Cornell Tech in order to affirm that some “predatory users” were profiting from these exchanges this […] дальше »
2019-5-8 23:00 | |
|
|
Chinese Authorities Probably Want to Exploit Blockchain to Secretly Monitor Citizens
By CCN. com: In modern times, China has worked to consolidate state power over individuals. Local authorities are trialing systems to control peoples’ social standing, access to jobs, and even where they can go. дальше »
2019-5-7 15:53 | |
|
|
$11,500 Bitcoin Price Will Absolutely Become a Reality in 2019
By CCN: In mid-December 2017, the bitcoin price traded at around $19,000, and bullish sentiment was so strong that the $11,500 mark seemed to be a distant memory. Over a year and a half and a vicious crypto market decline later, bitcoin climbing as high as $11,500 before the end of 2019 remains unthinkable, even to many bulls. дальше »
2019-5-7 21:30 | |
|
|
Someone Utilized the ‘Partial Payments Exploit’ In The XRP Ledger And Got Away With 7 Million XRPs From An Exchange
The XRP Ledger has a ‘Partial’ Payments Feature/Exploit This was highlighted by the Bitrue exchange as it explained how a user managed to withdraw 7 million ‘real’ XRP tokens from a Taiwan-based crypto exchange called BitoPro. дальше »
2019-5-3 20:27 | |
|
|
The Microsoft Outlook hackers are stealing victims’ Bitcoin
Earlier this month, hackers accessed the emails of numerous Microsoft Outlook users after snatching the credentials of one of the company’s customer support reps. But now it turns out the hackers were also able to steal users’ cryptocurrency. дальше »
2019-4-30 11:44 | |
|
|
Zerocoin exploit found, Zcoin attacked, other privacy coins at risk
The Zcoin team discovered a vulnerability in the cryptography of the Zerocoin protocol that allows an attacker to forge zero-knowledge proofs and create coins out of thin air. Coins using the protocol such as Veil are vulnerable to attack until Zerocoin is disabled. дальше »
2019-4-29 22:01 | |
|
|
Quantum breakthrough could lead to ‘super-powered’ hard disk drives
While the world’s focused on the latest Avenger’s flick, an international team of scientists have potentially unlocked the super powers of another familiar Marvel character: Magneto. Researchers from the Argonne National Laboratory, Oakland University in Michigan, and Fudan University in China have discovered a quantum-level exploit that has the potential to give engineers greater control over the magnetic properties of certain metals. дальше »
2019-4-27 23:49 | |
|
|
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
|
|
Report: North Korea May Exploit Southeast Asia’s Crypto Exchanges
North Korea could pose a threat to countries across Southeast Asia as it looks to exploit cryptocurrency exchanges due to gaps in regulatory frameworks, according to a new report. дальше »
2019-4-25 17:04 | |
|
|
Behind the scenes: Electrum hackers steal $4M with Bitcoin phishing attacks
Electrum Bitcoin wallet users have lost 771 BTC (approximately $4 million) since late December 2018, in an ongoing series of targeted phishing attacks. According to research released by Malwarebytes Labs, fraudsters were able to trick unsuspecting users into downloading a malicious version of the wallet by exploiting a weakness in the software. дальше »
2019-4-16 18:02 | |
|
|
Wall Street Shenanigans: Rampant Trading Bots are Exploiting Crypto Exchanges
By CCN. com: Cryptos’ attempts to distance and differentiate itself from traditional financial markets has taken another knock. This follows revelations that trading manipulation using high-frequency bots is rampant on decentralized exchanges (DEX) by researchers at Cornell Tech. дальше »
2019-4-16 17:06 | |
|
|
Binance Shows Augur (REP) Has a Contract Design Flaw Attack on its Prediction Markets
The Ethereum-based prediction market Augur (REP) seems to be facing a design flaw attack. The information was released by Binance Research in a blog post on April 1st. According to Binance Research, there is a malicious market creator that may design a market to exploit a purposeful flaw. Binance Research Unveils Design Flaw Attack on […] дальше »
2019-4-1 23:09 | |
|
|
Cryptojobs Is a Platform With 1,300 Vacancies in the Cryptocurrency Industry
The sight of new job ads being published regularly, at a time when some businesses have been downsizing to cope with the crypto winter, is a positive sign. The importance of job boards connecting companies with professionals is growing, with Cryptojobs one such platform. дальше »
2019-3-29 15:29 | |
|
|
Coingapp Allows You to Exploit Arbitrage Opportunities Between Exchanges
The Coingapp mobile application gives crypto traders a chance to profit from price differences between various trading platforms. The app compiles market data from several dozen crypto exchanges to offer suggestions about where to buy low and where to sell high. дальше »
2019-3-28 16:29 | |
|
|
Steam vulnerability exposed users to account hijacking and malware
A vulnerability in Valve‘s Steam platform made it possible for malicious actors to take over user accounts, pilfer their items, and even infect their systems with additional malware. The security kink resided in Steam‘s server browser functionality – which lets players look up severs for a number of games (including hit titles like CS:GO, Half-Life 2, and Team Fortress 2) – according to a HackerOne vulnerability disclosure made public on March 15. дальше »
2019-3-21 19:42 | |
|
|
Korean Giant Kakao Corp to Introduce Crypto Wallets Soon to 44 Million Users
South Korea has always been one of the nations where cryptocurrencies generate a strong enthusiasm in the population, and several major corporations are determined to exploit the full potential of blockchain technologies and their surrounding. дальше »
2019-3-20 21:02 | |
|
|
Governments Exploit Christchurch Tragedy to Enforce Censorship and Thought Policing
No sooner had the victims of the Christchurch attack fallen than governments were clamoring to mine the tragedy for political capital. Despite the shooting having been live streamed on Facebook, antipodean officials have directed their ire against fringe websites in a desperate bid to control the narrative and criminalize curious civilians. дальше »
2019-3-19 22:05 | |
|
|
4 Men Exploit Bitcoin ATMs in Canada for $200,000 — ATMs Companies In Danger?
Canadian law enforcement officials are on the lookout for 4 individuals who are responsible for carrying out over 100… The post 4 Men Exploit Bitcoin ATMs in Canada for $200,000 — ATMs Companies In Danger? appeared first on Invest In Blockchain. дальше »
2019-3-14 11:21 | |
|
|
WinRAR Exploit Allows Coin Wallet Theft, But It Has Survived 14 Years Without Any Public Knowledge
Most cryptocurrency exchanges have some kind of auditing performed on their platform periodically, determining if there are any glitches or bugs that would inhibit the safety of consumers. There is a trialware product called WinRAR, which is file archiver utility for Windows operating systems. дальше »
2019-3-10 17:50 | |
|
|
14-Year-Old WinRAR Exploit Allegedly Threatens Crypto Wallets
According to a user on the Bitcoin subreddit, there is an exploit on a common version of WinRAR that enables the potential theft of coins. The bug, which allowed executable code to be inserted on a system after opening a RAR file, has apparently existed for 14 years but is only recently coming to light. дальше »
2019-3-10 22:30 | |
|
|
Beyond Canonicals: Determining Coin Age in Account-based Blockchains
Introduction Blockchain data gives us a unique opportunity to perform novel economic research. There have been several metrics developed for Bitcoin that exploit the availability of onchain data and show us a picture of the Bitcoin economy which is impossible to get in the fiat world. дальше »
2019-3-10 19:35 | |
|
|
Will This Vulnerability Finally Compel Bitmain to Open Source Its Firmware?
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability. A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware. дальше »
2019-2-21 23:44 | |
|
|
Judge Chooses Representative Counsel for QuadrigaCX Creditors
Justice Wood has appointed legal counsel to represent some 115,000 creditors in incipient legal proceedings against seemingly insolvent cryptocurrency exchange QuadrigaCX, documents published today, February 19, 2019, from the Halifax, Nova Scotia court reveal. дальше »
2019-2-20 00:52 | |
|
|
The Daily: Privacy Coin Strength Debated, Hardware Wallet Exploit Demonstrated
In Tuesday’s edition of The Daily, we detail the theoretical vulnerability found in the Coldcard crypto wallet, coming just one month after its manufacturer ridiculed the flaw found in other hardware wallets. дальше »
2019-1-29 17:00 | |
|
|
Apple temporarily disables group FaceTime to fix a bug that lets you eavesdrop on your contacts
There was chaos on the internet late last night after 9to5Mac discovered a bug in Apple’s FaceTime video calling app that let you hear other person’s voice even before they answered your call. According to the report, a user running iOS 12. дальше »
2019-1-29 08:16 | |
|
|
Investigation Reveals Criminals Exploit Fortnite V-Bucks To Launder Money Without Players Knowledge
Fortnite has become a major success since its original launch, but cybercriminals have found a way to exploit it for their own gain with underhanded actions. In a report from The Block, it appears that these cybercriminals infiltrated the fairly weak security system allowed them to sell V-Bucks, the in-game currency of Fortnite, which were […] дальше »
2019-1-17 07:23 | |
|
|
Ethereum’s Constantinople Hard Fork Gets Delayed Due to Critical Bug
CoinSpeaker Ethereum’s Constantinople Hard Fork Gets Delayed Due to Critical Bug ChianSecurity discovered a new bug in Ethereum Constantinople upgrade that would allow attackers to exploit the hard fork software code and continuously withdraw user funds. дальше »
2019-1-16 13:04 | |
|
|
Despite Supreme Court Ruling, Chile’s Antitrust Court Orders Banks to Keep Crypto Exchange Accounts Open
Following the ruling by Chile’s supreme court that a bank can legally close accounts of a crypto exchange, the country’s Court of Defense of Free Competition reaffirmed that banks must reopen crypto exchanges’ accounts. дальше »
2019-1-5 07:00 | |
|
|
Despite Supreme Court, Chile’s Antitrust Orders Banks to Keep Crypto Accounts
Following the ruling by Chile’s supreme court that a bank can legally close accounts of a crypto exchange, the country’s Court of Defense of Free Competition reaffirmed that banks must reopen crypto exchanges’ accounts. дальше »
2019-1-5 07:00 | |
|
|
Neutrino: A Privacy-Preserving Light Wallet Protocol
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server. дальше »
2019-1-4 21:11 | |
|
|
Did you #DeleteFacebook? Shady players can still exploit your data
Caring about our online privacy might be popular right now, but on a wider level, it’s not as easy as we think to escape the hole we’ve dug ourselves into. дальше »
2019-1-2 14:21 | |
|
|
Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »
2019-1-1 19:15 | |
|
|
Bitcoin Private Premine Blamed On Bug Exploit
While most of the market is on its way to recovery, one cryptocurrency is still struggling. Bitcoin Private (BTCP), an anonymity-protecting protocol which launched last March, is battling against allegations that developers may have secretly premined two million coins, giving themselves control of nearly ten percent of the total supply. дальше »
2018-12-25 21:07 | |
|
|
We ranked Netflix’s new holiday movies on how likely they were written by a robot
It’s that time of year again. What always amazes me is how much tacky crap people will tolerate for the holidays. Creepy music, vulgar light decorations, gross food… the list goes on. Don’t get me wrong, there’s a lot of great stuff too. дальше »
2018-12-24 17:23 | |
|
|
This is the future of authentication, according to security experts
Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »
2018-12-19 12:00 | |
|
|
























