Techniques - Свежие новости [ Фото в новостях ] | |
New Report Studies Satoshi Nakamoto’s Inconsistent British and American Writing Techniques
On December 31, 2020, a new report was published that studies Satoshi Nakamoto’s writing style, the creator’s use of expressions, and spelling. The new examination shows Satoshi’s spelling and American and British wording indicates it was very inconsistent and littered with misspellings as well. дальше »
2021-1-7 06:00 | |
Belgian Regulator Warns of Crypto Scammers That Target Male Tinder Users With Fake ICOs
The Belgian regulator, the Financial Services and Markets Authority (FSMA), says scammers are employing new techniques which target Tinder and Facebook users. Using what the FSMA terms an “emotional scam,” criminals are targeting male users of the dating app Tinder with promises of exceptional returns on investments. дальше »
2020-12-10 10:30 | |
Microsoft Warns Cybersecurity Threat Posing as Monero Miners Attempts to Extract Data
A recently released Microsoft report has revealed that threat actors at the state level are now using coin miner techniques to cover their tracks or blend in. The report, which was published on Nov 30, highlights a recent attempt by state threat actor ‘BISMUTH,’ which leveraged Monero coin miners to infiltrate both government and private […] The post Microsoft Warns Cybersecurity Threat Posing as Monero Miners Attempts to Extract Data first appeared on BitcoinExchangeGuide. дальше »
2020-12-3 00:02 | |
Nation-state hacker group uses mining techniques to stay hidden
BISMUTH, a nation-state threat actor, is taking advantage of crypto mining techniques to disguise its attacks, according to the Microsoft 365 Defender Threat Intelligence team. The team unveiled this news through a report on November 30, noting that the hacker group is now releasing crypto-mining malware alongside its regular cyberespionage toolkits. дальше »
2020-12-3 18:33 | |
The Blockchain Detective - Taking on elite cybercriminals & owning them
Richard Sanders is a co-founder and lead investigator at CipherBlade, an elite blockchain investigation agency that works closely with top crypto exchanges, blockchain protocols, and the FBI. The agency uses a potent mix of on-chain and off-chain analytics and investigative techniques to track the most sophisticated cyber criminals on the planet. дальше »
2020-12-2 04:00 | |
Microsoft Report says Nation-State Hacker Group is Leveraging Cryptocurrency Techniques to Stay Under the Radar
A new security report by Microsoft says nation-state hacker group Bismuth is now deploying cryptocurrency-mining malware alongside its regular cyber-espionage toolkits. According to the report, the deployment by Bismuth of Monero coin miners in recent campaigns has provided another way for the attackers to monetize compromised networks. дальше »
2020-12-1 18:00 | |
Cybersecurity Firm, CipherTrace, Files Second Patent for Tracking Privacy Coin Monero (XMR)
A press release shared to the BEG news desk confirms CipherTrace, a blockchain analysis, and cybersecurity firm, has filed its second “Monero tracing” patent – “Techniques and Probabilistic Methods for Tracing Monero. дальше »
2020-11-23 17:59 | |
CipherTrace files two Monero (XMR) tracking patents
CipherTrace, a blockchain analytics firm has filed two patent applications for tracing privacy-centric cryptocurrency Monero (XMR). The firm unveiled this news on November 20, noting that the patent applications are dubbed Techniques and Probabilistic Methods for Tracing Monero and Systems and Methods for Investigating Monero. дальше »
2020-11-24 15:43 | |
Australia’s Cyber Security Centre explains the techniques used by hackers
Australian Cyber Security Centre warns citizens of ‘crypto-jacking’ malware The Australian Cyber Security Centre... The post Australia’s Cyber Security Centre explains the techniques used by hackers appeared first on Coin Journal. дальше »
2020-6-30 16:12 | |
15 defendants plead guilty to fraud and money laundering techniques that used Bitcoin
Two Romanian individuals pled guilty to the charges, says US Department of Justice The... The post 15 defendants plead guilty to fraud and money laundering techniques that used Bitcoin appeared first on Coin Journal. дальше »
2020-6-13 15:11 | |
How to get guaranteed +1095% to a crypto portfolio per year?
There are several ways and techniques to predict the behavior of a particular chart of the exchange rate of an asset, but none of them will give you a 100% guarantee. How can you guarantee a stable income without the risk of losing your own investment portfolio? Caleb Hill and his team of scientists from […] дальше »
2020-4-29 09:28 | |
Bullet-Proof Crypto Mixer ‘’PenguinX’’ Brings Anonymity to Bitcoin
Bitcoin was born with the intention of having a currency free from the control of banks and governments. However, Bitcoin and most other cryptocurrencies are transparent and can be subject to analysis techniques that destroy users’ privacy. дальше »
2020-4-9 07:14 | |
Ripple Investors File Lawsuit Claiming XRP Is Not Security
Coinspeaker Ripple Investors File Lawsuit Claiming XRP Is Not SecurityRipple CEO Brad Garlinghouse will have to defend his position as a legitimate XRP seller. Per Bradley Sostack, a former XRP investor and the lead plaintiff in the case against Brad, Garlinghouse used unlawful techniques to sell XRP. дальше »
2020-4-2 18:52 | |
50% of US Departments Fell Victim to Ransomware in 2019, Report
Over half of all public and private organizations in the US fell victim to ransomware attacks at some point in 2019. Hackers have continued to employ increasingly advanced techniques to infect machines and encrypt sensitive data. дальше »
2020-1-30 02:00 | |
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-11 09:39 | |
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. дальше »
2020-1-12 09:39 | |
Litecoin’s MimbleWimble Privacy Upgrade is Bitcoin Friendly
Litecoin has undertaken to create a new privacy upgrade, using techniques that were initially developed for Bitcoin. The proposal will enable users to access an opt-in privacy software by making MimbleWimble transactions on an Extension Blocks kind of side-chain. дальше »
2019-12-3 18:03 | |
Hard Problems in Cryptocurrency: Five Years Later
Special thanks to Justin Drake and Jinglan Wang for feedback In 2014, I made a post and a presentation with a list of hard problems in math, computer science and economics that I thought were important for the cryptocurrency space (as I then called it) to be able to reach maturity. дальше »
2019-11-25 04:03 | |
Here’s How Crypto Investors Can Improve OPSEC Following BitMEX Email Leak
BitMEX is in hot water with the crypto community after it inadvertently exposed the email contact information of its users publicly, prompting concerns from traders around the globe. And while the leak could put traders at risk of being hacked, there are a number of techniques that victims of the leak can put into place. дальше »
2019-11-2 00:00 | |
This marketing hall of famer, Seth Godin, is sharing his freelancing secrets for only $19
Across 12 lectures and an hour of supplemental content, Godin charts the course for you to take more effective control of your career, from sharpening your work techniques and crafting a brand to cultivating clients and boosting demand for your products and services. дальше »
2019-10-22 15:00 | |
Fake News Hurts the Cryptocurrency Industry — Artificial Intelligence May Stop It
You have probably heard of deepfakes, techniques that use machine learning to generate fake images and videos that can make practically anybody appear to say anything. What you might not know, however, is that similar technology is now being applied to written text, allowing AIs to generate completely fabricated written works — including potentially endless […] The post Fake News Hurts the Cryptocurrency Industry — Artificial Intelligence May Stop It appeared first on BeInCrypto. дальше »
2019-10-18 04:43 | |
eToro Unveils New Crypto Portfolio Based on the Algorithm of Twitter Mentions
Coinspeaker eToro Unveils New Crypto Portfolio Based on the Algorithm of Twitter MentionsThis sentiment-driven trading platform by eToro will advance machine-learning techniques to analyze investors perceptions. дальше »
2019-10-16 13:52 | |
Send Bitcoin and Other Crypto To Uncensorable, Personalized Domain Addresses
Cryptography consists of studying, developing, and practicing techniques for securing data from third-parties. The practice led to Bitcoin and other crypto addresses being difficult to remember strings of letters and numbers, as a way to keep them secure and prevent unwanted access. дальше »
2019-10-12 22:00 | |
How Do Bitcoin Trading Bots Initiate a Buy or Sell Signal?
There are several methods traders use to initiate buy and sell signals. They are divided into pre- and post-breakout/breakdown techniques. While some traders use momentum indicators to identify moves before they happen, others wait for confirmation before initiating a trade. дальше »
2019-10-10 19:04 | |
Google releases trove of deepfake videos to help researchers devise detection methods
We’ve seen multiple instances of deepfake technology being used to harm someone mentally or financially. To fight this, researchers need to develop detection algorithms to weed out such videos. дальше »
2019-9-25 10:38 | |
This $29 bundle cracks the code behind closing more sales
Did you know you could break down the sales process into seven distinct stages, then optimize your approach to each stage to land and keep more clients? That’s just one of the techniques you’ll discover with training found in The Complete Sales Hacker Bundle. дальше »
2019-9-24 15:00 | |
Understanding PLONK
Special thanks to Justin Drake, Karl Floersch, Hsiao-wei Wang, Barry Whitehat, Dankrad Feist, Kobi Gurkan and Zac Williamson for review Very recently, Ariel Gabizon, Zac Williamson and Oana Ciobotaru announced a new general-purpose zero-knowledge proof scheme called PLONK, standing for the unwieldy quasi-backronym “Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge”. дальше »
2019-9-24 04:03 | |
Hackers are now attacking Android users with advanced SMS phishing techniques
Researchers have uncovered a new kind of “advanced” phishing attack targeting Android phones that can trick users into installing malicious settings on their devices that are disguised as innocuous network configuration updates. дальше »
2019-9-4 16:00 | |
The Dawn of Hybrid Layer 2 Protocols
Special thanks to the Plasma Group team for review and feedback Current approaches to layer 2 scaling - basically, Plasma and state channels - are increasingly moving from theory to practice, but at the same time it is becoming easier to see the inherent challenges in treating these techniques as a fully fledged scaling solution for Ethereum. дальше »
2019-9-2 04:03 | |
Google accused of ‘privacy gaslighting’ over its anti-tracking policy
Google’s watered-down anti-tracking policy for the web has invited fresh criticism from experts who say the search giant’s move amounts to ‘privacy gaslighting. ’ Last week, the company announced proposals for what it calls a ‘privacy sandbox’ — a solution that aims to protect your privacy while also offering advertisers a way to show you targeted ads without resorting to more opaque techniques like fingerprinting. дальше »
2019-8-27 14:34 | |
Coinbase Custody Acquires Xapo’s Institutional Business
Coinbase Custody today announced that it has acquired Xapo’s institutional business, making it the largest crypto-custodian in the world. The acquisition brings Assets Under Custody (AUC) to over $7 billion, servicing over 120 clients in 14 countries. дальше »
2019-8-16 13:00 | |
This spooky Monero-mining malware waits to be controlled remotely
Cybersecurity researchers have discovered a mysterious new strain of cryptocurrency mining (cryptomining) malware that employs powerful techniques to avoid detection and analysis. Software firm Varonis determined the malware is based on Monero mining software XMRig, which is open source and hosted on GitHub. дальше »
2019-8-15 23:42 | |
7 Unorthodox Ways to Mine Bitcoin
Bitcoin isn’t crazy – in fact it might just be the soundest monetary system this generation has ever known. Some of the techniques miners have devised to extract it, however, are extremely unorthodox, ranging from the ingenious to the downright crazy. дальше »
2019-7-20 04:30 | |
Fears of AI-powered hacking are misplaced as criminals are doing fine without it
Artificial intelligence is captivating tech news audiences. Unfortunately, growing expectations for AI’s impact on legitimate business have spawned a distracting narrative about potential AI-powered cyberattacks. дальше »
2019-7-11 14:00 | |
Crypto exchange Bittrex acquires customized trading app tool Tradedash
Bittrex, the popular bitcoin and cryptocurrency trading platform, today announced that it further bolstered its real-time and advanced technology offerings with the purchase of Tradedash, a trading application tool that provides professional and personal customers with secure and customizable trading experience. дальше »
2019-7-3 23:30 | |
Hackers are turning our AI security systems against us — but they can be stopped
With the use of AI growing in almost all areas of business and industry, we have a new problem to worry about – the “hijacking” of artificial intelligence. Hackers use the same techniques and systems that help us, to compromise our data, our security, and our lifestyle. дальше »
2019-6-22 17:00 | |
Yet another cryptocurrency mining botnet caught targeting China
It seems we can’t go more than a week without news of a new cryptocurrency mining malware or botnet being discovered. This time, security researchers have uncovered another Monero mining botnet that’s targeting China. дальше »
2019-6-13 16:02 | |
Sidechains vs Plasma vs Sharding
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »
2019-6-14 04:03 | |
Bitcoin [BTC]: Privacy comes at cost only when privacy techniques are expensive, claims former BTC developer
In a recent discussion, Claudia Diaz, a Professor at the University of Leuven, and Peter Todd, early Bitcoin Core Developer, teamed up on the sidelines of the Magical Crypto Conference 2019 to talk about Bitcoin’s crypto-anarchist image and privacy issues. дальше »
2019-5-14 22:30 | |
Binance Announces 'Significant' Security Changes Following Hack
Cryptocurrency exchange Binance has revealed that it will be revamping its security network to prevent a recurrence of the 7,000 BTC hack it experienced on May 78, 2019. дальше »
2019-5-11 19:59 | |