Search
Tron Blockchain Stalled for Hours by ‘Malicious Contract,’ Justin Sun Says
2.11.2020
A “malicious contract” caused a Tron blockchain super representative to suspend block production for a few hours on Monday
IPFS lead explains how malicious files are eliminated from its network
24.10.2020
Decentralized ecosystems still need a way to deal with nefarious files
Research: New Malware Employs Tor and Bittorrent To Steal Bitcoin and Ether
4.9.2020
A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report...
Tesla Foils Ransomware Attack After Employee Rejects Bitcoin Bribe Worth $1 Million
1.9.2020
Tesla’s Elon Musk has said the company recently foiled attempts to infect its computer network with malicious software, after an employee cooperated with the FBI in an investigation. The malicious software would create an opportunity for criminals to extort money from Tesla. Musk’s...
Someone Just Lost $16M in Bitcoin By Using a Malicious Install of the Electrum Wallet
31.8.2020
An Electrum wallet user claims to have lost a fortune in bitcoin after installing an older version of the software from a malicious source
Bitcoin Users Leery of Tor: 23% of the Network’s Exit Capacity Compromised
13.8.2020
Hackers are stealing bitcoin through the large-scale use of malicious relays on the Tor network according to a newly published research report on the subject. The researcher dubbed “nusenu” said he warned people about the growing problem in December 2019 but instead of improving...
The Five Most Malicious Ransomwares Demanding Crypto to Watch Out For
4.7.2020
As tech advances, so too, do the malware attacks. Amid a pandemic, ransomwares are turning to privacy-centric coins to get away with crime
Jetpack Scan
2.6.2020
Fresh from the Jetpack team at Automattic, today, comes Jetpack Scan. Jetpack Scan scans all the files on your site looking for anything suspicious or malicious and lets you know, or literally fixes it for you with your one-click approval.
This kind of security scanning is very important to...
Google Pulls 49 Cryptocurrency Wallet Browser Extensions Found Stealing Private Keys
15.4.2020
Google has removed 49 cryptocurrency wallet browser extensions after a security researcher discovered they were stealing private keys. These Chrome extensions targeted users of crypto wallets, such as Ledger, Trezor, Jaxx, Electrum, Myetherwallet, Metamask, Exodus, and Keepkey. Also read: Bitcoin...
Ledger Wallet User Allegedly Lost $16K to Malicious Browser Extension
2.1.2020
Ledger hardware wallet confirms phishing alert for “Ledger Secure” Chrome browser extension
Chrome Browser Extension Ethereum Wallet Injects Malicious JavaScript To Steal Data
31.12.2019
Chrome extension ‘Shitcoin Wallet’ is injecting malicious javascript to steal user data
Malicious Groups Collated Leaked Crypto Trader Data - BitMEX
4.11.2019
After major cryptocurrency exchange BitMEX accidentally leaked users' emails last week, they've noticed unidentified groups who tried collecting users' email addresses with the intent to compromise them.
"As it became clear that several groups were working to collate BitMEX email addresses...
Zcash Community Discovers Likely Malicious Fake Version of ZecWallet
21.10.2019
Zcash users discover a counterfeit version of ZecWallet
Sucuri Researchers Report About Malicious Plug-ins Attacking WordPress Websites
20.10.2019
The recent revelation by the researchers of a website security firm, Sucuri, concerning the malicious plugins has shocked the crypto domain to the core. As per the research, the attackers employ the malicious plugins to facilitate a sneak peek into the WordPress websites for fulfilling their...
Hackers Use Malicious Code in WAV Audio Files To Mine Cryptocurrencies
18.10.2019
Hackers use malicious code in WAV audio files to mine cryptocurrencies
Hackers Have Looted More Bitcoin Than Satoshi’s Entire Stash
24.5.2019
Ever since cryptocurrencies started gaining value, hackers have targeted exchanges that provide digital asset trading and malicious entities have siphoned billions of dollars worth of bitcoin since 2010. So far, over 1 million of the world’s BTC has been stolen from exchanges and traders...
Beware! Hackers are Sending Spyware in Your Smartphone through WhatsApp call
20.5.2019
Yes, it is difficult to believe, but it is true. WhatsApp is facing this threat. The secretive Israeli company, NSO Group, has developed a malicious code to transmit it through phone calls. The malicious code gets transmitted to the target smartphone, even if the call is not answered. Soon after...
The 10,000 Year Clock Design Principals
8.1.2019
In the new year edition of the Clearleft newsletter, Jeremy Keith linked to the design principals Danny Hillis thought about while considering a clock that would work for 10,000 years.
Here's part of that page, satisfyingly displayed as a <dl>:
Longevity:
Go slow
Avoid sliding friction...
Anatomy of a malicious script: how a website can take over your browser
13.7.2018
By now, we all know that the major tech behemoths like Facebook or Google know everything about our lives, including how often we go to the bathroom (hence all the prostate medication ads that keep popping up, even on reputable news sites). After all, we’ve given them permission to do so,...