Результатов: 359

Here’s how personalized ransomware attacks work, and how to protect yourself

Once a piece of ransomware has got hold of your valuable information, there is very little you can do to get it back other than accede to the attacker’s demands. Ransomware, a type of malware that holds a computer to ransom, has become particularly prevalent in the past few years and virtually unbreakable encryption has made it an even more powerful force. дальше »

2019-3-28 19:54


Stellar Suffered an Inflation Bug in 2017 Creating 2B XLM, Messari Reports

Coinspeaker Stellar Suffered an Inflation Bug in 2017 Creating 2B XLM, Messari ReportsAn attacker exploited a concurrency bug and created 2. 25 billion XLM. Despite there were no media reports on the matter, Stellar stated that they had mentioned the bug twice in their release notes where they made it clear that the bug was exploited. дальше »

2019-3-28 13:35


Bitstamp Shows How Much Money A Bitcoin Blockchain Attacker Would Need To Perform A 51% Attack

Bitstamp Shows How Much Money An Attacker Would Need To Perform A 51% Attack On Bitcoin In a recent post on Twitter, the popular cryptocurrency exchange Bitstamp provided information about how much money an attacker would need a day to perform a 51% attack on Bitcoin’s network. The post mentions that hacking Bitcoin with a […] дальше »

2019-1-10 01:45


Gate.io возместит $200 000, потерянные пользователями из-за атаки 51% на Ethereum Classic

Представители Gate. io заявили, что биржа покроет убытки на примерно 40 тысяч ETC (около $200 тысяч), которые понесли ее пользователи из-за продолжающейся «атаки 51%» на блокчейн Ethereum Classic. [https://t. дальше »

2019-1-8 22:46


Фото:

Zoom bug let attackers hijack your screens during conference calls

Videoconferencing is almost always terrible at the best of times, but can you imagine someone taking control of your screen during a meeting and sending inappropriate messages to the other attendees? Zoom patched this kind of vulnerability in the desktop app for its video chat service last week to save people from a conference call from hell. дальше »

2018-12-4 15:44


Фото:

A Bug Making Ethereum Transactions on Exchanges Vulnerable Has Been Fixed

A bug centering around a new Ethereum token, GasToken, which was enabling abuse on cryptocurrency exchanges, appears to have been resolved. The details are provided in a report originally published on November 13, 2018, that discussed how the bug was exploited by attackers, and what digital platforms could do if they wished to protect their hot wallet funds. дальше »

2018-11-22 00:34


Target blames Bitcoin scam tweet on third-party app, not Twitter

American retail behemoth Target has come out to clarify that a tweet it posted, containing a link to a Bitcoin giveaway scam, came from a third-party software provider – not Twitter. In an email to Hard Fork, a company spokesperson said – contrary to what it suggested previously – Target’s Twitter account was never inappropriately accessed. дальше »

2018-11-15 14:12


Latest Crypto Mining Malware Viruses Cridex and Gozi Reinvent Themselves to Target Exchanges

A new computer virus that spread all over the web is threatening Switzerland. The virus allows the attacker to mine Monero (XMR) using the victim’s CPU power. This kind of virus was ranked as the sixth most significant malware to hit Switzerland during the first half of 2018. The information was released in a paper […] дальше »

2018-11-10 06:11


Фото:

Blockstream’s Liquid Network Could Be Vulnerable to Hardware Backdoors

Bitcoin technology company Blockstream has conceded its flagship Liquid Network could be susceptible to hardware vulnerabilities. Following recent disclosures that certain Chinese-manufactured motherboards contain backdoors, Blockstream has authored a post conceding that such an exploit could allow an attacker to infiltrate their off-chain bitcoin transfer system. дальше »

2018-10-6 10:50


Intel’s Foreshadow CPU Bug Exposes SGX’s Sensitive Data, Crypto World on Notice

Security Flaw Exposed In Intels Software Guard Extensions On Tuesday, analysts discovered the Foreshadow vulnerability in Intel’s Software Guard Extensions (SGX). This vulnerability is defined as “a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third-party clouds.” There are two different approaches that this […] дальше »

2018-8-16 19:25


A Guide to 99% Fault Tolerant Consensus

Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type). дальше »

2018-8-9 04:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03