Результатов: 109

IRS is Developing ‘Exploitation Techniques’ to Break Into Crypto Wallets

According to its March report, the emergence and rapid adoption of cryptographic currencies have created a gap in digital forensic capabilities, and the decentralization and anonymity provided by cryptos are fostering an environment for the storage and exchange of value outside of the traditional purview of law enforcement and regulatory organizations. дальше »

2021-5-1 21:10


Ledger Hardware Wallet to Issue Exploit Fix to Prevent Users from Sending BTC on Accident

According to a blog published by Mo Nokhbeh, a crypto software researcher, the Ledger Wallet app is in danger of exploitation due to a vulnerability that has persisted on the platform since 2019. According to Mo, a user can send Bitcoin (BTC) instead of other Bitcoin forks such as the BTC testnets, Litecoin, Bitcoin Cash […] дальше »

2020-8-6 21:24


Фото:

Japanese Non-Profit to Use Blockchain for Cobalt Tracing, Aims to Fight Child Labor

An Amnesty International finding shows that children–sometimes as young as seven, are toiling in cobalt mines in the Democratic Republic of the Congo (DRC), central Africa. Far from the gleaming surfaces of modern touch screen devices that rely on batteries, the inhalation of cobalt dust and child labor exploitation for the estimated 40,000 children illegally workingRead MoreRead More. дальше »

2020-6-20 01:07


Coinbase Reveals How It Averted A Complex Hacking Attack Seeking To Extract Private Keys And Passwords

Coinbase’s security team has revealed that it managed to stop a complex phishing attack that sought to extract user private keys and passwords. In an official blog post the crypto exchange giant revealed that the incident involved the exploitation of two 0-day vulnerabilities on the Mozilla Firefox browser. According to the blog post, the first […] дальше »

2019-8-9 21:17


Фото:

Facebook open-sources APIs to help fight child exploitation and terrorist propaganda

Facebook today announced it’s open-sourcing two technologies that help it curb the spread of problematic content like child exploitation, terrorist propaganda, or graphic violence online. These technologies aid the social network in detecting identical and nearly identical photos and video in order to weed out content that’s been flagged as being in violation of its policies. дальше »

2019-8-2 08:50