2023-3-13 07:08 |
Cybersecurity firm Imperva found a vulnerability that could be used to leak user information such as email addresses and phone numbers, which has now been patched.
Similar to Notcoin - Blum - Airdrops In 2024
2023-3-13 07:08 |
Cybersecurity firm Imperva found a vulnerability that could be used to leak user information such as email addresses and phone numbers, which has now been patched.
Similar to Notcoin - Blum - Airdrops In 2024
A major flaw in an Indian local search app, Justdial, allowed hackers to log in to any of its 156 million users accounts. Apart from accessing user information such as names, phone numbers, and email addresses, the vulnerability allowed them to peek into financial details including balance and transactions of an account through JustDial Pay, the company’s payment service.
2019-10-10 08:44 | |
AirSwap, an Ethereum based peer to peer decentralized exchange announced a “critical vulnerability” in their new smart contract release during the weekend. The internal security review processes picked out a loophole in the new AirSwap Instant smart contract in about 20 user addresses.
2019-9-16 17:19 | |
ShapeShift, a crypto hardware wallet company has recently talked about the vulnerabilities that were found on its KeepKey wallets. According to the company, someone recently submitted a report that a vulnerability was found in the system.
2019-8-8 23:43 | |
Crypto swaps and hardware wallet producer ShapeShift responded to recent reports that there was a side-channel attack vulnerability in one of its devices
2019-8-8 21:07 | |
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting.
2019-4-27 22:07 | |
Several outlets and crypto programmers have pointed out for a year or more that MetaMask, by default, broadcasts your Ethereum public key (address) to websites you visit. The assumption is that this is a privacy vulnerability – most sites have no need for such information, after all.
2019-4-2 21:13 | |
Following a report published by Ledger which outlined five vulnerabilities within Trezor wallets, the company has responded and addressed the issues in a March 12, 2019 blog post. Put on the Spot When a blockchain or crypto firm is under fire, whether for an acquisition or a hack, it is always in their best interestRead MoreRead More.
2019-3-14 00:00 | |
CCN earlier reported that Coinomi wallet had a confirmed bug that allowed Google to view the details of a user’s seed phrase. The seed phrase generates a wallet. Coinomi uses a 24-word phrase. It enables a user to regenerate their wallet on any platform, and maintain a simultaneous wallet on their phone and on their desktop.
2019-2-28 10:48 | |
Software wallet firm Coinomi has denied claims that the wallet sends unencrypted recovery phrases through Google’s remote spell checker
2019-2-28 01:15 | |
After another data leak, its second such leak in a year, Google today announced it was shutting down its beleaguered social media platform, Google+. API access will shut down even sooner, within the next 90 days.
2018-12-13 04:31 | |
A recent vulnerability in the Ethereum network could have reportedly allowed hackers to gain massive profits from cryptocurrency exchanges which haven’t set up a Gas usage limit. A Critical Vulnerability A group of researchers discovered a vulnerability in Ethereum which allowed attackers to drain exchanges by burning their ETH on high transaction costs or to benefit directly by minting GasToken.
2018-11-27 02:00 | |
A newly discovered vulnerability on Ethereum allowing for malicious GasToken Minting was found. The development team already acknowledged the issue and informed most of the affected users on November 13, 2018, via private disclosure.
2018-11-24 18:00 | |
A critical vulnerability in an Ethereum token made it possible for malicious actors to force cryptocurrency exchange desks to spend extremely high fees on transactions. Even worse, the attackers could abuse the bug for profit.
2018-11-22 13:55 | |
In today’s rapidly advancing world of blockchain innovation, it’s no secret that cryptocurrency wallets, exchanges and enterprise platforms are targets for nefarious activity.
2018-10-16 18:58 | |
A massive vulnerability has been discovered in the decentralized betting platform Augur. Hackers have been able to feed users incorrect data and game the system. Everything shown by the app was susceptible to faking, from transactions to wallet addresses – even the markets could have been forgeries.
2018-8-7 19:09 | |
It appears popular cryptocurrency Monero, often praised for its privacy functions, was riddled with security vulnerabilities – one of which allowed hackers to steal coins directly from the wallets of exchange desks.
2018-8-2 15:16 | |
Since its invention, a recurring question for cryptocurrency holders has been how to best secure their digital assets. This question of security carries the greatest weight when one understands the stakes of holding unprotected cryptocurrency — vulnerability to hackers.
2018-7-6 03:51 | |