article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves. Every blockchain uses a consensus protocol which allows all nodes on the network to agree on the current state of the blockchain.

article thumbnail

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. Twenty-five years later, blockchain is here and can bring those use cases to life. However, blockchain requires organizations to think about their data not as an asset they own, but as a shared resource—a shift in mindset that is not easy for everyone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. A relatively new method of fraud on the ICO market was stealing a White Paper of ICO project and presenting an identical idea under a new brand name. Pierluigi Paganini.

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

As long as the adb tools is being used in a secured environment, it presents little risk. ” The binary establishes a connection to the C&C server, then scans processes running on the compromised device and attempts to kill any that are running the CoinHive script that could be mining Monero. Pierluigi Paganini.

Mining 50
article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

“Among these 48 recovered residential proxies IP addresses, 28 (58.3%) of those were already present in our sinkhole systems, associated with the Mylobot malware family,” Arnoud continued. “This number is probably higher, but we don’t have a full visibility of the botnet. million from private investors.

Passwords 235
article thumbnail

Decarbonizing Cryptocurrencies through Taxation

Schneier on Security

This presents a perfect opportunity to curb their environmental damage. This allows currencies to maintain their decentralized ledger—the blockchain—but requires enormous amounts of energy. The most blunt solution is to ban cryptocurrency mining altogether. In fact, some have near-zero emissions.

article thumbnail

Crypto Mining Service Coinhive to Call it Quits

Krebs on Security

com , a cryptocurrency mining service that has been heavily abused to force hacked Web sites to mine virtual currency. Coinhive took a whopping 30 percent of the cut of all Monero currency mined by its code, and this presented something of a conflict of interest when it came to stopping the rampant abuse of its platform.

Mining 202