Результатов: 359

Dan Larimer On 30k EOS Hack, “No Different Than High Fee Transaction Spam On BTC Or ETH”

An exploitation of EOSIO allowed an attacker to gain 30,000 EOS worth over $110k by winning every roll on the gambling decentralized app (DApp) EOSPlay. The attacker used REX, the Resource Exchange is a bucket that collects all the EOSIO resource fees including RAM sales and name auctions, to have the blocks filled with transactions […] дальше »

2019-9-15 17:52


Фото:

iPhone spyware campaign reportedly targeted Uyghur Muslims for 2 years

The data-stealing iPhone exploits detailed by Google last week may been used for state-sponsored campaigns targeting the Uyghur Muslim minority in China‘s autonomous region of Xinjiang. “The websites were part of a campaign to target the religious group by infecting an iPhone with malicious code simply by visiting a booby-trapped web page,” TechCrunch revealed, citing sources familiar with the matter. дальше »

2019-9-2 08:45


Фото:

PSA: Update your Windows machine now to fix 29 Critical security vulnerabilities

Microsoft has patched four serious vulnerabilities that could allow a malicious actor to remotely take control of Windows computers. The four remote code execution flaws — addressed as part of the company’s monthly Patch Tuesday updates — affect all in-support versions of Windows and concern the Windows Remote Desktop Services (RDS) component, enabling attackers to take over a computer and then propagate malware to other computers without any user intervention. дальше »

2019-8-14 14:35


Фото:

Vicious malware threatens to turn search engine into crypto-mining zombie botnet

Enterprise search engine Elasticsearch is under threat of being turned into a sophisticated cryptocurrency mining botnet to be used in distributed denial of service (DDoS) attacks. Cybersecurity firm Trend Micro describes a new malware strain that launches multi-stage attacks on publicly accessible databases and servers that run old versions of Elasticsearch software. дальше »

2019-7-23 17:54


Фото:

Apple steps in to automatically remove Zoom’s risky software from Macs

Apple has pushed a silent update to Mac users to remove the web server sneakily installed by popular video conference app Zoom, TechCrunch reports. Earlier this week, a disclosure by security researcher Jonathan Leitschuh revealed how Zoom installed a secret local web server on Mac devices — with an intent to save an extra click — but left users vulnerable by making it possible for an attacker to hijack their webcams. дальше »

2019-7-11 08:41


Фото:

Researchers find terrifying security vulnerability in GE Healthcare anesthesia machines

Security researchers from Israeli firm CyberMDX have discovered a vulnerability in a select number of GE Healthcare’s anesthesia and respiratory devices. CyberMDX, which focuses primarily on medical cybersecurity, states that if successfully exploited, the hole could allow an attacker to interfere the operation of these sophisticated medical machines, thereby posing a risk to patients. дальше »

2019-7-10 23:30


Scary Monero Flaw Patched to Kill Crypto Exchange Theft Threat

Monero developers have revealed nine security flaws, and one of them can be exploited to steal XMR from cryptocurrency exchanges. Two critical Monero bugs discovered “By mining a specially crafted block, that still passes daemon verification an attacker can create a miner transaction that appears to the wallet to include sum of XMR picked by […] The post Scary Monero Flaw Patched to Kill Crypto Exchange Theft Threat appeared first on CCN Markets дальше »

2019-7-5 13:19


Фото:

Monero security flaw could’ve seen XMR stolen from cryptocurrency exchanges

Privacy-focused altcoin Monero has suddenly disclosed nine security vulnerabilities — including one that could have allowed hackers to steal XMR from cryptocurrency exchanges. Until March, rogue Monero miners were hypothetically able to create “specifically-crafted” blocks to force Monero wallets into accepting fake deposits for an XMR amount chosen by the attacker. дальше »

2019-7-4 18:18


Sidechains vs Plasma vs Sharding

Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »

2019-6-14 04:03


Cryptopia hack: Over $7 million worth of Ethereum [ETH] transferred by hacker to unknown wallet

The New Zealand cryptocurrency exchange, Cryptopia, which fell to its doom due to a security breach that occurred earlier this year, continues to stay in the headlines. The attacker, who almost drained the exchange’s entire Ethereum wallets, has been transferring the stolen funds since the beginning of the day. дальше »

2019-5-20 20:32


Bitcoin Cash exploit cripples network during scheduled hardfork upgrade

A bug was reportedly exploited on Bitcoin Cash during a scheduled hardfork upgrade of the protocol. For an hour and a half transactions went unprocessed, causing fees to skyrocket. A source familiar with the project says the exploit “looks like a timed attack,” while other rumors are circulating that the “attacker” placed a 180,000 BCH short […] The post Bitcoin Cash exploit cripples network during scheduled hardfork upgrade appeared first on CryptoSlate. дальше »

2019-5-16 21:43