Результатов: 717

These few lines of CSS code will crash your iPhone

A security researcher has found out that due to a vulnerability in WebKit (a rendering engine used by Safari browser), it takes only a few lines of CSS code to crash an iPhone or an iPad. The code itself is not too complex and uses multiple nested elements like <div> tags inside a CSS effect called backdrop-filter, used for color shifting behind the element. дальше »

2018-9-17 14:33


Intel’s Foreshadow CPU Bug Exposes SGX’s Sensitive Data, Crypto World on Notice

Security Flaw Exposed In Intels Software Guard Extensions On Tuesday, analysts discovered the Foreshadow vulnerability in Intel’s Software Guard Extensions (SGX). This vulnerability is defined as “a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third-party clouds.” There are two different approaches that this […] дальше »

2018-8-16 19:25


Фото:

Bitcoin [BTC] Developer Discovers Vulnerability In Bitcoin Cash [BCH] Code, Finds It Near Impossible to Report the Bug to Developers

On Thursday, August 9, a developer and researcher in the crypto industry detailed the difficulties he had communicating a vulnerability in the Bitcoin Cash protocol to their dev team. Cory Fields from the Digital Currency Initiative at MIT Media Lab in Massachusetts outlined the issue in a post on his Medium blog. дальше »

2018-8-10 12:02


With $417K, EOS accounts for two-thirds of all cryptocurrency bug bounties in 2018

As interest, adoption, and venture funding in blockchain tech continue to rise, so do attacks from hackers. In an effort to counteract potential threats, a growing list of startups in the cryptocurrency space have opted to launch programs to invite hackers to disclose vulnerabilities responsibly – instead of exploiting them for personal gains. дальше »

2018-8-8 18:30


Фото:

Cryptocurrency Malware Infects Over 200,000 Mikrotik Routers

A cryptojacking campaign has affected over 200,000 routers made by Mikrotik, the Latvian networking company.   A Months-Old Vulnerability Exploited Security researchers recently mapped a series of cryptomining attacks, which initially attacked a large number of users in Brazil to create a growing mining botnet by infecting compromised devices with malware. дальше »

2018-8-7 07:00


Фото:

Monero Glitch Allowed Hackers To Steal XMR From Exchanges

The Next Web’s in-house cryptocurrency column recently reported that Monero, the foremost privacy-centric cryptocurrency, was subject to a relatively minor cybersecurity vulnerability. According to the technology news outlet, “inventive” hackers could create false transaction data via the copying of a simple line of code from the Monero wallet code base, which is open-sourced and easily […] The post Monero Glitch Allowed Hackers To Steal XMR From Exchanges appeared first on Ethereum World News. дальше »

2018-8-3 06:14


Фото:

‘I’m Not That Sloppy’: 15-Year Old Ridicules Bitfi After Hacking ‘Unhackable’ Wallet

A fifteen-year-old has claimed to have successfully compromised the “unhackable” Bitfi hardware wallet endorsed by John McAfee. ‘Bullshit Walks’? In a Twitter exchange August 1, Saleem Rashid, who rose to prominence online after uncovering a vulnerability in hardware wallet Ledger in March, defied claims by Bitfi that its product boasted indestructible security. дальше »

2018-8-3 00:00


Исследование: вирусы-майнеры стали популярнее троянов-вымогателей

Занимающаяся информационной безопасностью компания Skybox Security выпустила отчет, согласно которому доля вирусов-майнеров криптовалют превысила долю ранее популярных троянов-вымогателей. Check out our mid-year update to the Skybox Security Vulnerability and Threat Trends Report analyzing vulnerabilities, exploits and threats in play. дальше »

2018-7-19 10:24


Фото:

Op Ed: Addressing the Threat of Cryptomining Malware

One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »

2018-7-18 23:18