Результатов: 717

Ethereum Constantinople Fork Delayed After Detecting Introduced Smart Contract Vulnerabilities

A security firm identified a vulnerability introduced by the planned Jan. 16th Constantinople hard fork, compelling the core Ethereum developers to issue an emergency postponement. On Jan. 15th, 2019, ChainSecurity—a smart contract auditing and security firm—detected a vulnerability introduced by the Constantinople hard fork upgrade. дальше »

2019-1-16 02:53


Фото:

The Daily: Critical Bug Found in Beam Wallet, Wirex Adds Another Cryptocurrency

In Friday’s edition of The Daily, we cover the news about a vulnerability found in the Beam Wallet days after the launch of the Mimblewimble-based coin. Also, crypto card provider Wirex has added waves to its list of supported cryptocurrencies, and digital asset exchange Exmo has registered an increase in the number of Belarusian users […] The post The Daily: Critical Bug Found in Beam Wallet, Wirex Adds Another Cryptocurrency appeared first on Bitcoin News. дальше »

2019-1-11 14:30


В Beam Wallet обнаружена критическая уязвимость

Разработчики приватной криптовалюты Beam на базе протокола MimbleWimble обнаружили критическую уязвимость в кошельке Beam Wallet, затрагивающую и десктопную версию, и CLI-имплементацию. CRITICAL VULNERABILITY IN BEAM WALLET 9. дальше »

2019-1-10 11:06


Фото:

Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3

In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »

2019-1-1 19:15


Фото:

This is the future of authentication, according to security experts

Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »

2018-12-19 12:00


Фото:

Zoom bug let attackers hijack your screens during conference calls

Videoconferencing is almost always terrible at the best of times, but can you imagine someone taking control of your screen during a meeting and sending inappropriate messages to the other attendees? Zoom patched this kind of vulnerability in the desktop app for its video chat service last week to save people from a conference call from hell. дальше »

2018-12-4 15:44