Attacker - Свежие новости [ Фото в новостях ] | |
Here’s how personalized ransomware attacks work, and how to protect yourself
Once a piece of ransomware has got hold of your valuable information, there is very little you can do to get it back other than accede to the attacker’s demands. Ransomware, a type of malware that holds a computer to ransom, has become particularly prevalent in the past few years and virtually unbreakable encryption has made it an even more powerful force. дальше »
2019-3-28 19:54 | |
Stellar Suffered an Inflation Bug in 2017 Creating 2B XLM, Messari Reports
Coinspeaker Stellar Suffered an Inflation Bug in 2017 Creating 2B XLM, Messari ReportsAn attacker exploited a concurrency bug and created 2. 25 billion XLM. Despite there were no media reports on the matter, Stellar stated that they had mentioned the bug twice in their release notes where they made it clear that the bug was exploited. дальше »
2019-3-28 13:35 | |
Ukranian Hacker Caught Infecting His Own Websites with Crypto Malware
According to the Ukranian cyber police, an unnamed man infected a bunch of his websites with Wannacry-like malware. Police Search Reveals Intentional Infection An unreliable Google translation makes it sound as if the man’s home had been invaded and police were investigating when they discovered his activities. дальше »
2019-3-28 22:14 | |
Stellar silently patched a bug that allowed a user to ‘create’ 2.25 million XLM worth $10 million
According to a new research report by Messari, Stellar had a bug which was abused by a user to create 2. 25 million XLM, worth approximately $10 million in 2017. This bug was identified by Stellar’s Development Foundation [SDF] and patched thereafter. дальше »
2019-3-27 18:15 | |
GitLab now automatically warns against merging API keys into your codebase
GitLab, the hugely popular devops platform, today announced the introduction of secrets detection with version 11. 9 of the service. This means that should someone inadvertently include an API key or secret in a commit to a shared repository, the service will warn the user. дальше »
2019-3-23 18:06 | |
Report: “Wrapped Serials” ZeroCoin Attack
On March 6th 2019, an attack was detected on the PIVX network zerocoin protocol, or zPIV. The linked article provides detailed information about the vulnerability which allows an attacker to fake serials accepted by the network, effectively allowing them to spend zerocoins which were never minted.It also includes information дальше »
2019-3-18 07:11 | |
Bitcoin Ransomware Cripples Boston Legal System for Two Weeks
Boston public defenders suffered a ransomware attack some weeks back but have chosen not to send the bitcoin demanded by the attacker. Instead, they decided to use back-ups to restore services. The Committee oversees public defenders in Boston. дальше »
2019-3-15 20:33 | |
Phishing Scam Hits LocalBitcoins, Clients Lose Funds
On January 26, 2019, clients of peer-to-peer bitcoin trading service LocalBitcoins were the targets of a phishing scam which resulted in the theft of a handful of bitcoins. дальше »
2019-1-31 18:40 | |
LocalBitcoins Suffers $28,000 Phishing Attack
The popular peer-to-peer trading site LocalBitcoins has reportedly experienced a significant attack and theft. At 10:00 UTC on January 26, the site’s administrators detected an issue that allowed an attacker to gain access to various user accounts. дальше »
2019-1-28 23:23 | |
Crypto Hacker Scores $28,600 After Hack Of Bitcoin Exchange
Attacker Bags Eight Bitcoin (BTC) In LocalBitcoins Breach The crypto market may have slowed, with Bitcoin (BTC) falling by upwards of 70% during yesteryear, but ambitious attackers have continued their attempts to breach industry upstarts. дальше »
2019-1-27 22:09 | |
Google’s head of account security has fix for cryptocurrency SIM-swapping
SIM-swapping has plagued cryptocurrency holders for close to a year, and now Google’s head of account security has had enough. He wants to put a stop to it with a clever gadget the size of a flash drive. дальше »
2019-1-23 13:03 | |
BetterHash Protocol Lets Pool Miners Regain Control Over Their Hash Power
One problem that concerns many is the centralization of mining within the Bitcoin ecosystem. Fortunately, there are talented developers working to solve this problem and Matt Corallo, full-time Bitcoin developer at Chaincode Labs, is one of them. дальше »
2019-1-26 23:50 | |
Ethereum Classic Attacker May Soon Be Located; Hacker Returns Funds
Ethereum Classic has issued an important update on the events of last week. Over the past several days, the project has gradually admitted that recent suspicious blockchain activity was indeed caused by a malicious attacker. дальше »
2019-1-16 23:55 | |
ETC 51% Attacker Returns $100,000
A crypto exchange says: “The recent ETC 51% attacker returned 100k USD value of ETC back to Gate.io. We were trying to contact the attacker but we haven’t got any reply... The post ETC 51% Attacker Returns $100,000 appeared first on Trustnodes. дальше »
2019-1-14 18:44 | |
The Ethereum Classic Attacker Has Sent a Bigger Message
If a permissionless blockchain doesn’t have a large enough community of users, developers and miners, its vulnerable, writes Michael J. Casey. дальше »
2019-1-14 13:00 | |
Bitstamp Shows How Much Money A Bitcoin Blockchain Attacker Would Need To Perform A 51% Attack
Bitstamp Shows How Much Money An Attacker Would Need To Perform A 51% Attack On Bitcoin In a recent post on Twitter, the popular cryptocurrency exchange Bitstamp provided information about how much money an attacker would need a day to perform a 51% attack on Bitcoin’s network. The post mentions that hacking Bitcoin with a […] дальше »
2019-1-10 01:45 | |
Gate.io возместит $200 000, потерянные пользователями из-за атаки 51% на Ethereum Classic
Представители Gate. io заявили, что биржа покроет убытки на примерно 40 тысяч ETC (около $200 тысяч), которые понесли ее пользователи из-за продолжающейся «атаки 51%» на блокчейн Ethereum Classic. [https://t. дальше »
2019-1-8 22:46 | |
Zoom bug let attackers hijack your screens during conference calls
Videoconferencing is almost always terrible at the best of times, but can you imagine someone taking control of your screen during a meeting and sending inappropriate messages to the other attendees? Zoom patched this kind of vulnerability in the desktop app for its video chat service last week to save people from a conference call from hell. дальше »
2018-12-4 15:44 | |
10 Rules for the Secure Use of Cryptocurrency Hardware Wallets
CryptoNinjas Published by Trail of Bits, Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. They combine high-end security research with a real world attacker mentality to. дальше »
2018-12-3 16:54 | |
SamSam Ransomware hackers that pocketed millions in bitcoin indicted in Atlanta
Over the past few years, SamSam has wreaked havoc on victims spanning the entire globe. SamSam is a type of malware called ransomware that blocks users access to their own networks and computers until is a ransom is paid to the attacker. дальше »
2018-11-30 00:00 | |
A Bug Making Ethereum Transactions on Exchanges Vulnerable Has Been Fixed
A bug centering around a new Ethereum token, GasToken, which was enabling abuse on cryptocurrency exchanges, appears to have been resolved. The details are provided in a report originally published on November 13, 2018, that discussed how the bug was exploited by attackers, and what digital platforms could do if they wished to protect their hot wallet funds. дальше »
2018-11-22 00:34 | |
‘WebCobra’ Mining Malware is Scooping Up Zcash and Monero
McAfee Labs has reported the existence of a new strain of mining malware called WebCobra. This type of software hijacks a victim’s computer resources in order to mine cryptocurrency surreptitiously. дальше »
2018-11-16 05:02 | |
Target blames Bitcoin scam tweet on third-party app, not Twitter
American retail behemoth Target has come out to clarify that a tweet it posted, containing a link to a Bitcoin giveaway scam, came from a third-party software provider – not Twitter. In an email to Hard Fork, a company spokesperson said – contrary to what it suggested previously – Target’s Twitter account was never inappropriately accessed. дальше »
2018-11-15 14:12 | |
Latest Crypto Mining Malware Viruses Cridex and Gozi Reinvent Themselves to Target Exchanges
A new computer virus that spread all over the web is threatening Switzerland. The virus allows the attacker to mine Monero (XMR) using the victim’s CPU power. This kind of virus was ranked as the sixth most significant malware to hit Switzerland during the first half of 2018. The information was released in a paper […] дальше »
2018-11-10 06:11 | |
Attacker pledges to make 51 percent attacks a spectator sport
After attacks on Verge and Bitcoin Gold, the vulnerability of many altcoins to 51 percent attacks has been highlighted again by an anonymous Tweeter who has revealed plans to live stream attacks of low hashrate coins дальше »
2018-10-15 14:00 | |
Mischief-Maker Promises to Livestream a 51% Altcoin Attack
“On Oct 13, 3:00 CDT I will be doing a 51% attack against the cryptocurrency Einsteinium,” began the call-to-arms. As promises go, this one was as bold as it was brazen. The anonymous attacker has promised to assume majority hashrate control of an altcoin to demonstrate how easy the process is. дальше »
2018-10-9 08:15 | |
Pigeoncoin Hacked for $15,000: May be a Warning Sign for Other Bitcoin Forks
A minor altcoin called Pigeoncoin has suffered a small-scale attack resulting in the theft of 235 million PGN tokens, worth approximately $15,000. Some have mocked the attacker’s modest gains, with ZDNet wryly headlining the story “Hacker wastes entire day only to make $15,000. дальше »
2018-10-9 01:36 | |
Blockstream’s Liquid Network Could Be Vulnerable to Hardware Backdoors
Bitcoin technology company Blockstream has conceded its flagship Liquid Network could be susceptible to hardware vulnerabilities. Following recent disclosures that certain Chinese-manufactured motherboards contain backdoors, Blockstream has authored a post conceding that such an exploit could allow an attacker to infiltrate their off-chain bitcoin transfer system. дальше »
2018-10-6 10:50 | |
Monero Releases Malware Response Group and Successfully Patches Burn Bug
Monero has officially released its Malware Response Workgroup website yesterday. In an effort to help protect Monero’s community, the website aims to provide resources to educate about the types of malware that may take advantage of users. дальше »
2018-9-29 23:18 | |
Facebook reveals data breach affecting 50 million users
Facebook today announced a data breach occurred on September 25 affecting at least 50 million Facebook accounts. The social network disclosed the breach Friday morning, issuing a statement that said an “attack” on its system led to “the exposure of information” affecting the 50 million users, according to the New York Times. дальше »
2018-9-28 20:09 | |
Monero Developers Disclose Catastrophic XMR-Burning Bug in Wallets
Monero developers just publicly disclosed a potentially devastating XMR-burning bug. If exploited, the bug would have allowed attackers to drain Monero from exchange wallets for the cost of a few transaction fees. дальше »
2018-9-26 02:03 | |
Devs disclose critical XMR-burning bug in Monero wallets
Monero developers have disclosed a major bug that could really have been nasty. Until now, attackers could have drained Monero from exchanges (or any organizational wallet), all for the cost of a few transaction fees. дальше »
2018-9-25 19:10 | |
Crypto Wallet Protection App Wants to Secure Your Wallets Against Malware
Malware, a persistent thorn in the side of the internet’s wider community, has become an increasing concern for cryptocurrency users. A problem that comes in many forms, malicious software is leveraged by hackers to rob community members of their funds. дальше »
2018-9-18 23:37 | |
EOS Announces Solution to Counter-Reply any RAM-Steal Attacker: EOS/USD Breaks $5.00
The fifth largest coin by market capitalization is welcoming much gain after the roller-coaster pathway that the cryptocurrencies experienced the last days. Only behind MIOTA’s strong 15. 00% increase in the last 24-hours, EOS has jumped upwards for 4. дальше »
2018-8-27 13:05 | |
North Korean Hackers Set Sights on Crypto Traders Using Trojanized Trading Software
A new report from Kaspersky Labs reveals that North Korean hackers are now using their ‘Lazarus’ trojan to hack cryptocurrency traders and exchanges. Typically used for conducting political interference, “Lazarus has been a major threat actor in the APT arena for several years,” Securelist reports. дальше »
2018-8-25 23:11 | |
Intel’s Foreshadow CPU Bug Exposes SGX’s Sensitive Data, Crypto World on Notice
Security Flaw Exposed In Intels Software Guard Extensions On Tuesday, analysts discovered the Foreshadow vulnerability in Intel’s Software Guard Extensions (SGX). This vulnerability is defined as “a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside personal computers or third-party clouds.” There are two different approaches that this […] дальше »
2018-8-16 19:25 | |
A Guide to 99% Fault Tolerant Consensus
Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type). дальше »
2018-8-9 04:03 | |
A Prehistory of the Ethereum Protocol
Although the ideas behind the current Ethereum protocol have largely been stable for two years, Ethereum did not emerge all at once, in its current conception and fully formed. Before the blockchain has launched, the protocol went through a number of significant evolutions and design decisions. дальше »
2018-7-21 23:03 | |
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |
STARKs, Part II: Thank Goodness It's FRI-day
Special thanks to Eli Ben-Sasson for ongoing help and explanations, and Justin Drake for reviewing In the last part of this series, we talked about how you can make some pretty interesting succinct proofs of computation, such as proving that you have computed the millionth Fibonacci number, using a technique involving polynomial composition and division. дальше »
2018-7-21 23:03 | |