Vulnerabilities - Свежие новости [ Фото в новостях ] | |
Security vulnerabilities: Bug bounty hunters receive $32,000 in seven weeks for uncovering 30 crucial bugs
Owing to its digital nature, the cryptocurrency ecosystem has been riddled with bugs that have proven detrimental to the cryptosphere. From exchanges to wallets, almost all elements of the cryptoverse are prone to attacks and security vulnerabilities. дальше »
2019-5-21 11:45 | |
|
|
White Hat Hackers Profit Big Off The Blockchain Industry, Fixing Flaws For Popular Platforms
Hackers Are Making A Big Profit Off The Crypto Industry, Fixing Bugs In Popular Platforms Hackers have been paid over $32,000 for their exposure of vulnerabilities in crypto platforms since March 28th. дальше »
2019-5-21 22:15 | |
|
|
BitDefender researchers discover terrifying security vulnerability in Intel CPUs
Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. дальше »
2019-5-14 19:59 | |
|
|
Study: Cryptocurrency Trading Bots on the Rise
There are many organizations and corporations that are eager to use blockchain to increase efficiency and transparency in their respective sectors. However, it appears as though there are a growing number of bots that are exploiting vulnerabilities in various cryptocurrency exchanges according to a Homeland Security News Wire article published on May 6, 2019. дальше »
2019-5-8 15:00 | |
|
|
Zerocoin Vulnerabilities Disclosed: “Forged Coins Created, but Not Exceeding 1% of Circulating Supply”
On Tuesday, April 9th, 2019, the Zcoin team supposedly discovered irregularities in relation to the number of Zerocoin spends. To ensure further problems do not arise, the team decided it would be best to reach out to pools to inactivate Zerocoin spends – leading to a vigorous investigation. Said inactivation simply implies that created coins […] дальше »
2019-4-29 02:15 | |
|
|
Crypto-Stealing Gustuff Trojan Unmasks Alarming Banking Vulnerabilities
The darknet has a new soldier in the form Gustuff, a new Android trojan that has targeted over 125 cryptocurrency and banking apps. Gustuff has been in existence since April 2018 and stands with Anubis, Red Alert, and BankBot as one of the deadliest threats to the financial space. дальше »
2019-3-29 01:00 | |
|
|
Whitehat Hackers Cash In On Security Bounties on Crypto Platforms Stellar, Monero and Augur
Cryptocurrency platforms have taken to offering bounties to hackers recently, as they challenge white-hat hackers to test out their security, investigating for bugs and vulnerabilities in their system. дальше »
2019-3-29 00:09 | |
|
|
Security researchers found over 40 bugs in blockchain platforms in 30 days
White hat hackers have found more than 40 bugs in blockchain and cryptocurrency platforms in the past 30 days, according to an investigation by Hard Fork. There is a silver lining though: none of the vulnerabilities appear to be particularly serious at first glance. дальше »
2019-3-14 19:17 | |
|
|
Trezor Report Addresses Ledger’s Vulnerability Claims
Following a report published by Ledger which outlined five vulnerabilities within Trezor wallets, the company has responded and addressed the issues in a March 12, 2019 blog post. Put on the Spot When a blockchain or crypto firm is under fire, whether for an acquisition or a hack, it is always in their best interestRead MoreRead More. дальше »
2019-3-14 00:00 | |
|
|
«Игра престолов»: разработчики Trezor ответили на заявление Ledger об уязвимостях
Разработчики популярных аппаратных кошельков Trezor прокомментировали заявление компании-конкурента Ledger о ряде уязвимостей в своих продуктах. In response to Ledger’s presentation at #MITBitcoinExpo, here is how we mitigated the mentioned vulnerabilities. дальше »
2019-3-14 21:36 | |
|
|
Trezor Responds to Ledger Report on Its Wallet Vulnerabilities
The team behind the Trezor hardware wallet has addressed the vulnerabilities exposed by rival hardware wallet manufacturer Ledger. On… The post Trezor Responds to Ledger Report on Its Wallet Vulnerabilities appeared first on Invest In Blockchain. дальше »
2019-3-13 13:43 | |
|
|
Ledger Reveals Five Vulnerabilities in Competitor Trezor’s Wallets
Ledger, a major crypto hardware wallet manufacturer based in France, revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger. Ledger’s Attack Lab Discovered Vulnerabilities in Trezor’s Hardware Wallets The market for cryptocurrency hardware wallets is a rather competitive one due to the nature of cryptocurrencies. дальше »
2019-3-13 13:00 | |
|
|
Trezor Elaborates on Cryptocurrency Hardware Wallet Exploits Found by Rival Ledger
As reported by Bitcoin Exchange Guide on March 11, 2019, Ledger, a Paris-based cryptocurrency hardware manufacturer published a report, claiming that there are several vulnerabilities in the hardware wallets of its Prague-based direct competitor, Trezor. дальше »
2019-3-13 04:10 | |
|
|
Trezor Defends Crypto Wallet Security after Ledger’s MIT Bitcoin Bombshell
Ledger Chief Security Officer Charles Guillemet gave a shocking presentation at the MIT Bitcoin Expo this week in which he presented alleged vulnerabilities with the hardware cryptocurrency wallet produced by Trezor – perhaps its top competitor. дальше »
2019-3-13 23:07 | |
|
|
Ledger Reveals Five Vulnerabilities In Trezor Wallets
Ledger, one of the leading hardware wallet manufacturers, has discovered a number of vulnerabilities in devices created by its main competitor. The company says that there are five different security flaws distributed between the Trezor One and the Trezor Model T. дальше »
2019-3-13 21:36 | |
|
|
Ledger Finds Vulnerabilities In Trezor Hardware Wallets
Trezor’s late response shows the company has a lot of confidence in its customers. Unfortunately, it can’t really account for wealthy criminals.
дальше »2019-3-13 21:03 | |
|
|
Ledger: Аппаратные криптовалютные кошельки от Trezor имеют множественные уязвимости
Ведущий производитель криптовалютных аппаратных кошельков Ledger рассказал об уязвимостях, выявленных в устройствах своего прямого конкурента Trezor. Об этом говорится в сообщении, распространенном французской компанией в понедельник, 11 марта. дальше »
2019-3-12 09:47 | |
|
|
Blockchain asset management protocol Melon launches bug bounty
CryptoNinjas Melonport, a blockchain asset management protocol has put up a 250,000 Swiss franc bounty on bugs found on the Melon protocol. The bug bounty is a process designed to reward members of the public who help find and report security vulnerabilities in the. дальше »
2019-3-12 03:49 | |
|
|
Trezor Crypto Wallet Devices Have Several Vulnerabilities, Discovered By Competitor Ledger Wallet
Trezor Devices Have Several Vulnerabilities, Discovered By Competing Wallets Manufacturer The Ledger company manufactures hardware wallets for the cryptocurrency industry, but they have recently published a report regarding security. дальше »
2019-3-12 23:12 | |
|
|
Компания Ledger заявила о ряде уязвимостей в аппаратных кошельках Trezor
Ведущий производитель криптовалютных аппаратных кошельков Ledger рассказал об уязвимостях, выявленных в устройствах своего прямого конкурента Trezor. Об этом говорится в сообщении, распространенном французской компанией в понедельник, 11 марта. дальше »
2019-3-12 21:32 | |
|
|
IBM Launches New Blockchain Security Testing Service
IBM Security team X-Force Red has announced the launch of a new blockchain security testing service to help businesses identify weaknesses in solutions that incorporate blockchain technology. The new service, called X-Force Red Blockchain Testing, evaluates both the backend processes used to manage blockchain networks and the actual ledger environment to identify exploitable vulnerabilities, covering […] The post IBM Launches New Blockchain Security Testing Service appeared first on Coinjournal. дальше »
2019-3-7 01:16 | |
|
|
IBM's X-Force Red Team Rolls Out Blockchain Security Testing Service
IBM wants to test vulnerabilities in blockchains – before they reach mass adoption.
дальше »2019-3-7 22:46 | |
|
|
Bitcoin SV Team Rectifies Vulnerabilities for Multiple Bitcoin Blockchains
On March 1, 2019, the Bitcoin SV Team has detected three severe vulnerabilities in BSV. These bugs are believed to have been inherited from Bitcoin Core (BTC) and Bitcoin Cash (BCHABC). Bitcoin SV Team Detects Vulnerabilities The bitcoin SV Node Implementation Team, a branch of Craig Wright’s nChain, have remained steady in their unwavering commitmentRead MoreRead More. дальше »
2019-3-3 14:00 | |
|
|
Finally: Ethereum’s Network Upgrade Constantinople Is Here
Constantinople, an upgrade to Ethereum’s network has gone live. The upgrade marks the end of a month-long wait due to the discovery of potentially hazardous security vulnerabilities in the upgrade’s underlying code. дальше »
2019-3-2 14:25 | |
|
|
Will This Vulnerability Finally Compel Bitmain to Open Source Its Firmware?
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability. A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware. дальше »
2019-2-21 23:44 | |
|
|
Zcash Fixes And Discloses Vulnerabilities That Would Allow For Infinite ZEC Counterfeiting
The Zcash team has recently discovered and fixed a huge vulnerability of its system. Now, the team explained all about it on its official site. This vulnerability would have allowed hackers to counterfeit ZEC on the network, which would be a huge problem for the company. By using this bug, someone could print infinite ZEC […] дальше »
2019-2-6 04:52 | |
|
|
EOS Has Even More Vulnerabilities Than First Thought, Per HackerOne Blockchain Researchers
Blockchain researchers continue to find critical vulnerabilities in blockchain project EOS. The company behind EOS, Block. one, has already handed out $50,750 worth of bug bounties in the past five weeks, including five bounties labeled as “critical vulnerabilities”. дальше »
2019-2-6 23:47 | |
|
|
Five Critical Vulnerabilities Discovered in EOS in 2019, HackerOne Data Shows
This year, bug bounties for five critical vulnerabilities have been handed over by EOS.io, the company responsible for the development of EOS
дальше »2019-2-5 19:44 | |
|
|
Blockchain researchers are still finding critical vulnerabilities in EOS
Months after its nigthmarish launch, cryptocurrency and blockchain security researchers are still finding vulnerabilities in EOS, according to recent activity on breach disclosure platform HackerOne. дальше »
2019-2-5 17:46 | |
|
|
Bug Discovered On Ethereum Parity Nodes As New Solution Is Already Being Worked On
Bug Discovered On Ethereum Parity Nodes, But Solution Is Already Being Worked On As platforms continually update and investigate options that could help their functionality flourish, many will investigate their blockchain and software for potential vulnerabilities. дальше »
2019-2-4 18:48 | |
|
|
Implementation of zkSNARKs Could Be Imminent for Zilliqa (ZIL) and Its New Live Mainnet Status
Following 18 months of intense work, the Zilliqa (ZIL) Mainnet has finally launched. The original aim of the project was to solve the vulnerabilities in the Ethereum network, using Scilla programming language. дальше »
2019-2-1 23:45 | |
|
|
The Daily: Privacy Coin Strength Debated, Hardware Wallet Exploit Demonstrated
In Tuesday’s edition of The Daily, we detail the theoretical vulnerability found in the Coldcard crypto wallet, coming just one month after its manufacturer ridiculed the flaw found in other hardware wallets. дальше »
2019-1-29 17:00 | |
|
|
Elastos Carrier now deploys over one million network nodes
CryptoNinjas Elastos, a blockchain infrastructure for the internet providing a virtual ecosystem where decentralized applications are protected from the vulnerabilities of the existing internet, today announced that the number of TV Box units equipped with. дальше »
2019-1-29 04:16 | |
|
|
Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost Attacks
On Jan. 22, a team of students from the University of Illinois at Urbana Champaign (UIUC) released a unique study concerning the longevity of certain proof of stake (PoS) networks. According to the research, more than 26 PoS blockchains could suffer from vulnerabilities called “Fake Stake” attacks. дальше »
2019-1-25 19:45 | |
|
|
Researchers Find Flaws with Proof of Stake (POS) Cryptocurrency Projects
Researchers have found vulnerabilities with a surprising number of cryptocurrencies after noticing security flaws several months ago. The findings were summarized in a blog post on Medium, on January 22, 2019. дальше »
2019-1-24 13:00 | |
|
|
Fortnite vulnerability could have left millions of credit cards exposed
Just as triumphant reports come in about Fortnite‘s success, the world’s most popular game is forced to contend with stories about security vulnerabilities that could have exposed its millions of players to hackers. дальше »
2019-1-18 22:33 | |
|
|

























