article thumbnail

Illegal Content and the Blockchain

Schneier on Security

Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Since the blockchain is globally accessible and hard to take down, the botnet’s operators appear to be safe. What if someone puts illegal material in the blockchain? Most Bitcoin mining happens in China.

article thumbnail

FTX Collapse Highlights the Cybersecurity Risks of Crypto

eSecurity Planet

He has “worked around the clock” to secure assets, identify crypto on the blockchain , find records, and work with regulators and government authorities. One way is through hijacking computer resources to mine cryptocurrencies. The post FTX Collapse Highlights the Cybersecurity Risks of Crypto appeared first on eSecurityPlanet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security’s Impact on Climate Change: What Can Organisations Do?

IT Governance

Then there’s blockchain mining. In the early days of bitcoin mining, individuals could create new bitcoins using a standard computer set-up, but the process has grown so complex that it now requires a room full of specialised tools. Many people argue that the environmental cost of this is a necessary evil.

article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

The French Data Protection Supervisory Authority (the CNIL) has recently published its initial thoughts on this topic, providing some responses and practical recommendations on how the usage of a blockchain may be compatible with GDPR and more generally Data Protection Law, taking into account the “constraints” imposed by such technology. .

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

As long as the adb tools is being used in a secured environment, it presents little risk. ” The binary establishes a connection to the C&C server, then scans processes running on the compromised device and attempts to kill any that are running the CoinHive script that could be mining Monero. Pierluigi Paganini.

Mining 44
article thumbnail

Financial Services Data – More at risk than you’d believe

Thales Cloud Protection & Licensing

Another “canary in the coal mine” episode showcasing this trend happened just last week, with a sizeable breach of HSBC U.S. With digital transformation technologies like cloud, big data, IoT, containers, mobile payments and blockchain all in play, there are many new attack surfaces and risks to financial data.

article thumbnail

Executive Order on Ensuring Responsible Innovation in Digital Assets

Data Matters

The EO also focuses on the impact that blockchain technology and digital assets can have on financial inclusion and human rights (including the unbanked and underbanked) as well as on climate change and environmental pollution (including energy usage from mining and grid management).