With the potential to perform more advanced calculations and create more complex processing networks, quantum computers also pose new risks of compromising the most sophisticated cybersecurity systems.
#security
Hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.
Cybercriminals continue to invent new methods to get access to users’ personal information following popular trends in the corporate world. Researchers from Trend Micro have found two new malware files disguised as installers for Zoom, a video communications app that has seen extreme demand from users around the world following the spread of the coronavirus […]
A group of cybersecurity researchers has detected a severe security vulnerability in Bluetooth-based communication that can potentially enable bad actors to impersonate any Bluetooth master or slave device.
Amidst the unstable economic situation and uncertainty in the financial markets worldwide, financial safety should get lots of attention. Although, it’s much better to think about a rainy day in advance.
The crypto industry historically suffers from security issues. In 2019 alone hackers stole nearly $300 million from crypto exchanges. Exchanges, wallets, and payment processors have to respond with radical measures from large-scale audits to multi-million dollar insurance programs. In this piece, BDCenter Digital helps us explain how crypto projects protect their users.
Looking through the news that came up during the month, one may notice several closely packed cases of hacking, extortion, and other unsavory activities involving Bitcoin. While there seems to be no particular connection between these cases, this is an unkind reminder not to be negligent about basic cybersecurity.
Choosing a crypto-wallet is usually one of the first challenges that a rookie cryptocurrency user has to face. Of course, the internet is full of guides on how to make the choice. Those guides can be good or bad, reasonable or silly, free or sponsored, and so forth. Still, while such reviews are abundant, there […]
According to the report by CipherTrace, losses to frauds and theft related to cryptocurrency amounted to $4.4 billion in 2019. As the hi-tech market develops, cybercriminals have shifted their focus from exploiting technical vulnerabilities to social engineering. Using the typical weaknesses we humans have isn’t too hard and doesn’t require special skills.
We all keep a lot of personal information on our phones and obviously don’t want to share our correspondence, cryptocurrency wallets, or contacts to become a part of the public domain. Nonetheless, in some cases, authorities can ask you to provide full access to your device.
Developers of VeriBlock, a protocol aimed at delivering Bitcoin-level security to both new and established blockchain and cryptocurrency projects, announced the upcoming mainnet launch of the VeriBlock blockchain.
Ethereum Classic’s (ETC) development team admitted a malicious attack on the network had taken place and hopes the full extent of the incident will be known rather soon than later.