Новости о Vulnerability Takes [ Фото новости ] [ Свежие новости ] | |
Illuvium takes measures to protect staked funds post discovery of vulnerability
Over the past year, Decentralised Finance (DeFi) has experienced exponential growth with more than 4.3 million users at the time of writing. Needless to say, it doesn't show any signs of slowing down,The post Illuvium takes measures to protect staked funds post discovery of vulnerability appeared first on AMBCrypto. дальше »
2022-1-6 21:30 | |
IOTA takes a nosedive following Trinity wallet hack
A vulnerability in Trinity, IOTA’s official wallet, has been exploited resulting in the theft of millions of dollars worth of this cryptocurrency. Although the IOTA Foundation has taken different steps to prevent a further attack, IOTA plunged over 12 percent following the hack. дальше »
2020-2-14 14:19 | |
WhatsApp bug allowed hackers to steal files and messages by sending GIFs
You better update WhatsApp right now. A researcher has discovered a nasty vulnerability in the Facebook-owned privacy-oriented messenger that made it possible to for attackers to gain access to your files and messages up an exploit vector that attackers can abuse to obtain access to your device. дальше »
2019-10-2 16:08 | |
Cryptocurrency hackers sneak malware into Oracle servers to mine Monero
Security researchers have identified yet another cryptocurrency mining malware. This time it’s installing itself on enterprise application servers, and using a clever trick to remain hidden. If that wasn’t enough, the malware has already claimed its first major victim: Oracle servers. дальше »
2019-6-11 13:22 | |
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
Neutrino: A Privacy-Preserving Light Wallet Protocol
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server. дальше »
2019-1-4 21:11 | |
These few lines of CSS code will crash your iPhone
A security researcher has found out that due to a vulnerability in WebKit (a rendering engine used by Safari browser), it takes only a few lines of CSS code to crash an iPhone or an iPad. The code itself is not too complex and uses multiple nested elements like <div> tags inside a CSS effect called backdrop-filter, used for color shifting behind the element. дальше »
2018-9-17 14:33 | |
Japanese Syndicate Wallet Hacked, $10 Million Reported Missing
Shopin — a universal shopper profile that delivers personal shopping experiences through retailers’ apps, websites and stores — says one of its token distributors has been hacked and roughly $10 million in a variety of cryptocurrencies has been stolen. дальше »
2018-6-11 01:22 | |