Новости о Fake Attacks [ Фото новости ] [ Свежие новости ] | |
Hamster Kombat players fall victim to sophisticated phishing attacks through fake airdrops
In a troubling development, players of the rapidly growing Telegram-based clicker game, Hamster Kombat, have fallen victim to a series of sophisticated phishing attacks through fake airdrops. This new wave of cybercrime highlights the increasing threats faced by digital gaming communities. дальше »
2024-7-19 15:08 | |
|
|
Too harsh or too lenient? Changpeng Zhao’s sentence divides opinion
While many in the crypto community have leapt to the billionaire’s defense, others claim four months is an “egregious miscarriage of justice.” Let’s deal with the obvious irony first. After years and years of dismissing FUD, fake news and attacks… дальше »
2024-5-1 13:23 | |
|
|
Lazarus Group hackers launch new method for cyber attacks
North Korean hackers Lazarus Group used a fake LinkedIn profile to launch a cyber attack. дальше »
2024-4-29 16:59 | |
|
|
Google Ads Becomes Latest Platform Used to Steal Crypto in $500,000 Phishing Attacks
In a new twist on phishing attacks, fake wallet registration sites listed advertisements on Google Ads and solicited wallet passphrases from wallet holders. The post Google Ads Becomes Latest Platform Used to Steal Crypto in $500,000 Phishing Attacks appeared first on BeInCrypto. дальше »
2021-11-7 14:58 | |
|
|
Over $1 Billion Ethereum-Based Tokens Vulnerable to ‘Fake Deposit Exploit’
A number of university researchers published a study that demystifies the “fake deposit vulnerability” in Ethereum-based smart contracts. The findings show that over 7,000 tokens worth more than $1 billion built on top of Ethereum are vulnerable to two types of attacks that exploit smart contracts. дальше »
2020-8-28 03:00 | |
|
|
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-11 09:39 | |
|
|
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-12 09:39 | |
|
|
Sidechains vs Plasma vs Sharding
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »
2019-6-14 04:03 | |
|
|
Teenage California Crypto Thieves Pinch $35 Million in SIM Swap Scam
By CCN: Hackers, many in their teens, have drained the accounts of more than 50 Californian victims in a $35 million SIM swap heist. Officials estimate that in total, $50 million has been stolen in related attacks around the US since the beginning of 2018. дальше »
2019-5-23 15:59 | |
|
|
Binance CEO CZ attacks exchanges with fake trading volume; claims ‘credibility’ is most important
The issue of fake data in the cryptocurrency space has been prevalent for a long time now and many proponents and luminaries in the space are trying hard to combat it. Bitcoin [BTC], the largest cryptocurrency in the space, has been at the center of many controversies involving fake trading volumes and exchanges manipulating the […] The post Binance CEO CZ attacks exchanges with fake trading volume; claims ‘credibility’ is most important appeared first on AMBCrypto. дальше »
2019-4-6 17:30 | |
|
|
Mt. Fox: Fake Exchange Creator Aims to Prevent a Real Crypto Disaster
Fantasy fans may remember Arwen, the character from the “Lord of the Rings” who guides the main characters through a series of dangerous situations. The Arwen protocol intends to do the same, only for cryptocurrency trading. дальше »
2019-3-4 20:14 | |
|
|
Cardano (ADA) Not Susceptible to “Fake Stake” Attacks, Unlike 26+ Other Proof-of-Stake Cryptos
A new study conducted by a team of US researchers has discovered a fatal vulnerability that affects 26+ proof-of-stake… The post Cardano (ADA) Not Susceptible to “Fake Stake” Attacks, Unlike 26+ Other Proof-of-Stake Cryptos appeared first on Invest In Blockchain. дальше »
2019-1-31 08:38 | |
|
|
New University of Illinois Study Shows Blockchain Proof of Stake Networks Can be Vulnerable to Attacks
It seems that Proof of Stake (PoS) networks are also under attack. At least, they could be. A team of students from the University of Illinois released a new study related to PoS networks operating in the market. дальше »
2019-1-26 01:34 | |
|
|
Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost Attacks
On Jan. 22, a team of students from the University of Illinois at Urbana Champaign (UIUC) released a unique study concerning the longevity of certain proof of stake (PoS) networks. According to the research, more than 26 PoS blockchains could suffer from vulnerabilities called “Fake Stake” attacks. дальше »
2019-1-25 19:45 | |
|
|
Electrum Wallet Phishing Attack Nets Hackers $900K in Bitcoin
Hackers managed to steal close to $900,000 worth of Bitcoin from Electrum wallet users via a phishing attack. While the attacks seem to have come to a halt, Electrum Devs say the hackers can launch new exploits since the issue hasn’t been permanently fixed. дальше »
2018-12-28 15:00 | |
|
|
Investor Lawsuit Brought Against AT&T, T-Mobile for SIM Swapping Hacks
Leading cryptocurrency investor law firm Silver Miller Law has filed suit against cell phone giants AT&T and T-Mobile on behalf of several digital asset investors who were victims of the identity-theft tactic known as “SIM swapping. дальше »
2018-11-10 01:35 | |
|
|
North Korean Hacking Group Lazarus Behind $571M in Hacks Since January 2017
North Korean cybercrime hacking group The Lazarus Group is currently the biggest crypto hacking syndicate in the world, having stolen millions worth of cryptocurrencies from online exchanges. дальше »
2018-10-20 00:22 | |
|
|
Newdex Decentralized Crypto Exchange Robbed in New Hacking Attack
After discovering a new security vulnerability, hackers managed to flood a crypto exchange with fake EOS tokens. By the end of their operation, they ended up stealing as much as $58,000 from the exchange’s users directly. дальше »
2018-9-19 17:00 | |
|
|
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |
|
|
STARKs, Part II: Thank Goodness It's FRI-day
Special thanks to Eli Ben-Sasson for ongoing help and explanations, and Justin Drake for reviewing In the last part of this series, we talked about how you can make some pretty interesting succinct proofs of computation, such as proving that you have computed the millionth Fibonacci number, using a technique involving polynomial composition and division. дальше »
2018-7-21 23:03 | |
|
|








