article thumbnail

Illegal Content and the Blockchain

Schneier on Security

Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Since the blockchain is globally accessible and hard to take down, the botnet’s operators appear to be safe. What if someone puts illegal material in the blockchain? That’s how the system works.

article thumbnail

Poly Network Says $600 Million in Cryptocurrency Stolen

Data Breach Today

Platform Attempts to Communicate With Hackers Hackers have breached the blockchain-based Poly Network platform to steal more than $600 million in cryptocurrency, the platform announced Tuesday as it attempted to communicate with the hackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain: Poised to Transform Business

Data Matters

Listen to The Sidley Podcast for an informative discussion of how blockchain, digital assets and virtual currencies are changing the way we transact. Blockchain technology has the ability to transform how business and everyday commercial transactions are conducted across industries. Regulatory hurdles on a global scale.

article thumbnail

Hackers stole more than $81 million worth of crypto assets from Orbit Chain

Security Affairs

Orbit Chain is a multi-asset blockchain platform that connects various blockchains through Inter-Blockchain Communication (IBC). It aims to become a hub for the seamless transfer of assets and data between different blockchain ecosystems. It also hired the blockchain security company ChainLight.

article thumbnail

Top 5 use cases of Blockchain in the supply chain in 2020

OpenText Information Management

Successful supply chain operations rely on robust, transparent and end-to-end communications across geographically dispersed partner ecosystems. Due to the complexity and lack … The post Top 5 use cases of Blockchain in the supply chain in 2020 appeared first on OpenText Blogs.

article thumbnail

New NKAbuse malware abuses NKN decentralized P2P network protocol

Security Affairs

NKN (New Kind of Network) is a decentralized peer-to-peer network protocol that relies on blockchain technology. “This threat (ab)uses the NKN public blockchain protocol to carry out a large set of flooding attacks and act as a backdoor inside Linux systems.” The protocol enables secure and low-cost data transfer.

article thumbnail

U.S. and Australian police arrested Firebird RAT author and operator

Security Affairs

“Chakhmakhchyan allegedly began working with the creator of the Hive RAT, previously known as “Firebird,” approximately four years ago, and advertised online the RAT’s many features, including features that allowed the owner to remotely access victim computers and intercept communications and data without the victim knowing.