Techniques - Свежие новости [ Фото в новостях ] | |
How statechains are revolutionary for Bitcoin privacy and scalability
In most cases, the differing substrates of a blockchain impose limits on what techniques are available to engineers building these novel systems. The post How statechains are revolutionary for Bitcoin privacy and scalability appeared first on CryptoSlate. дальше »
2021-10-4 21:52 | |
|
|
Microsoft patents its 'ledger-independent token service' similar to Ethereum
Multinational technology corporation Microsoft has won its "ledger-independent token service" patent. This blockchain-related patent notes techniques for implementing a cross-chain token management syThe post Microsoft patents its 'ledger-independent token service' similar to Ethereum appeared first on AMBCrypto. дальше »
2021-8-27 21:30 | |
|
|
BSC Flash Loan Attack: The Three Copycats
A series of attacks compromised several Binance Smart Chain (BSC) projects in May. Following PancakeBunny, its three forks projects — AutoShark, Merlin Labs, and PancakeHunny — were also attacked using similar techniques. дальше »
2021-7-24 20:04 | |
|
|
Automated Trading Dominates in Financial Markets
Today, automatic trade dominates financial markets. People use special software, robots, and bots to optimize the trading process and maximize profits. The cryptocurrency market has not been left aside: all the techniques presented are also used here. дальше »
2021-6-9 10:58 | |
|
|
GlobalBase Security, Speed Upgraded, Gearing Up for Market Volatility
GlobalBase has the welfare of advanced and beginner traders in mind with ongoing maintenance and upgrade efforts routinely conducted on its platform. The global cryptocurrency trading company has announced that this series of overhauling measures include encryption techniques that large financial firms worldwide utilize in an effort to provide top-tier account security. Moreover, the platform’sRead More дальше »
2021-5-8 16:11 | |
|
|
IRS is Developing ‘Exploitation Techniques’ to Break Into Crypto Wallets
According to its March report, the emergence and rapid adoption of cryptographic currencies have created a gap in digital forensic capabilities, and the decentralization and anonymity provided by cryptos are fostering an environment for the storage and exchange of value outside of the traditional purview of law enforcement and regulatory organizations. дальше »
2021-5-1 21:10 | |
|
|
Sam Bankman Fried Explains His Arbitrage Techniques
Bankman-Fried launched a crypto-trading firm called Alameda Research in 2017. The company now manages over $100 million in digital assets. The firm’s large-scale trades made Bankman-Fried a self-made billionaire by the age of 29. дальше »
2021-4-9 16:29 | |
|
|
HUMAN Protocol Moves to Solana Blockchain In Search Of Scalability And Speed
HUMAN Protocol is a hybrid framework that helps in machine learning techniques by providing a marketplace for humans to contribute their reasoning, mental skills, and knowledge. These activities include labeling tasks, voicing tasks, and identifying photos, videos, and sounds to improve machines' intelligence. дальше »
2021-1-21 22:03 | |
|
|
New Report Studies Satoshi Nakamoto’s Inconsistent British and American Writing Techniques
On December 31, 2020, a new report was published that studies Satoshi Nakamoto’s writing style, the creator’s use of expressions, and spelling. The new examination shows Satoshi’s spelling and American and British wording indicates it was very inconsistent and littered with misspellings as well. дальше »
2021-1-7 06:00 | |
|
|
Belgian Regulator Warns of Crypto Scammers That Target Male Tinder Users With Fake ICOs
The Belgian regulator, the Financial Services and Markets Authority (FSMA), says scammers are employing new techniques which target Tinder and Facebook users. Using what the FSMA terms an “emotional scam,” criminals are targeting male users of the dating app Tinder with promises of exceptional returns on investments. дальше »
2020-12-10 10:30 | |
|
|
Microsoft Warns Cybersecurity Threat Posing as Monero Miners Attempts to Extract Data
A recently released Microsoft report has revealed that threat actors at the state level are now using coin miner techniques to cover their tracks or blend in. The report, which was published on Nov 30, highlights a recent attempt by state threat actor ‘BISMUTH,’ which leveraged Monero coin miners to infiltrate both government and private […] The post Microsoft Warns Cybersecurity Threat Posing as Monero Miners Attempts to Extract Data first appeared on BitcoinExchangeGuide. дальше »
2020-12-3 00:02 | |
|
|
Nation-state hacker group uses mining techniques to stay hidden
BISMUTH, a nation-state threat actor, is taking advantage of crypto mining techniques to disguise its attacks, according to the Microsoft 365 Defender Threat Intelligence team. The team unveiled this news through a report on November 30, noting that the hacker group is now releasing crypto-mining malware alongside its regular cyberespionage toolkits. дальше »
2020-12-3 18:33 | |
|
|
The Blockchain Detective - Taking on elite cybercriminals & owning them
Richard Sanders is a co-founder and lead investigator at CipherBlade, an elite blockchain investigation agency that works closely with top crypto exchanges, blockchain protocols, and the FBI. The agency uses a potent mix of on-chain and off-chain analytics and investigative techniques to track the most sophisticated cyber criminals on the planet. дальше »
2020-12-2 04:00 | |
|
|
Microsoft Report says Nation-State Hacker Group is Leveraging Cryptocurrency Techniques to Stay Under the Radar
A new security report by Microsoft says nation-state hacker group Bismuth is now deploying cryptocurrency-mining malware alongside its regular cyber-espionage toolkits. According to the report, the deployment by Bismuth of Monero coin miners in recent campaigns has provided another way for the attackers to monetize compromised networks. дальше »
2020-12-1 18:00 | |
|
|
Cybersecurity Firm, CipherTrace, Files Second Patent for Tracking Privacy Coin Monero (XMR)
A press release shared to the BEG news desk confirms CipherTrace, a blockchain analysis, and cybersecurity firm, has filed its second “Monero tracing” patent – “Techniques and Probabilistic Methods for Tracing Monero. дальше »
2020-11-23 17:59 | |
|
|
CipherTrace files two Monero (XMR) tracking patents
CipherTrace, a blockchain analytics firm has filed two patent applications for tracing privacy-centric cryptocurrency Monero (XMR). The firm unveiled this news on November 20, noting that the patent applications are dubbed Techniques and Probabilistic Methods for Tracing Monero and Systems and Methods for Investigating Monero. дальше »
2020-11-24 15:43 | |
|
|
Australia’s Cyber Security Centre explains the techniques used by hackers
Australian Cyber Security Centre warns citizens of ‘crypto-jacking’ malware The Australian Cyber Security Centre... The post Australia’s Cyber Security Centre explains the techniques used by hackers appeared first on Coin Journal. дальше »
2020-6-30 16:12 | |
|
|
15 defendants plead guilty to fraud and money laundering techniques that used Bitcoin
Two Romanian individuals pled guilty to the charges, says US Department of Justice The... The post 15 defendants plead guilty to fraud and money laundering techniques that used Bitcoin appeared first on Coin Journal. дальше »
2020-6-13 15:11 | |
|
|
How to get guaranteed +1095% to a crypto portfolio per year?
There are several ways and techniques to predict the behavior of a particular chart of the exchange rate of an asset, but none of them will give you a 100% guarantee. How can you guarantee a stable income without the risk of losing your own investment portfolio? Caleb Hill and his team of scientists from […] дальше »
2020-4-29 09:28 | |
|
|
Bullet-Proof Crypto Mixer ‘’PenguinX’’ Brings Anonymity to Bitcoin
Bitcoin was born with the intention of having a currency free from the control of banks and governments. However, Bitcoin and most other cryptocurrencies are transparent and can be subject to analysis techniques that destroy users’ privacy. дальше »
2020-4-9 07:14 | |
|
|
Ripple Investors File Lawsuit Claiming XRP Is Not Security
Coinspeaker Ripple Investors File Lawsuit Claiming XRP Is Not SecurityRipple CEO Brad Garlinghouse will have to defend his position as a legitimate XRP seller. Per Bradley Sostack, a former XRP investor and the lead plaintiff in the case against Brad, Garlinghouse used unlawful techniques to sell XRP. дальше »
2020-4-2 18:52 | |
|
|
50% of US Departments Fell Victim to Ransomware in 2019, Report
Over half of all public and private organizations in the US fell victim to ransomware attacks at some point in 2019. Hackers have continued to employ increasingly advanced techniques to infect machines and encrypt sensitive data. дальше »
2020-1-30 02:00 | |
|
|
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-11 09:39 | |
|
|
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-12 09:39 | |
|
|
7 Unorthodox Ways to Mine Bitcoin
Bitcoin isn’t crazy – in fact it might just be the soundest monetary system this generation has ever known. Some of the techniques miners have devised to extract it, however, are extremely unorthodox, ranging from the ingenious to the downright crazy. дальше »
2019-7-20 04:30 | |
|
|
Fears of AI-powered hacking are misplaced as criminals are doing fine without it
Artificial intelligence is captivating tech news audiences. Unfortunately, growing expectations for AI’s impact on legitimate business have spawned a distracting narrative about potential AI-powered cyberattacks. дальше »
2019-7-11 14:00 | |
|
|











