Search Results for "vulnerabilities"
Twitter Hires Former Hacker Peiter 'Mudge' Zatko as Head of Security
Following the high-profile security breach witnessed in July this year, Twitter has hired former hacker Peiter 'Mudge' Zatko as its new head of security.
US DHS Cybersecurity Official Expects to be Fired in Trump’s Post-Election Purge for Debunking Fake News
A United States Homeland cybersecurity official, Christopher Krebs expects to be cut in President Trump’s post-election purge for proactively debunking disinformation.
Tik Tok Pushes Harder for Blockchain Despite Vulnerabilities in Core System
Hundreds of millions of users are using Tik Tok, meaning that any breach of data could lead to serious vulnerabilities for users and the company.
Bluzelle Launch Looms as Decentralized Storage Goes Mainstream
Bluzelle, the decentralized data storage platform, is preparing for the launch of its mainnet on February 3, ushering in a new era for censorship-resistant data storage.
How Kaspersky Protects Investors During Token Sales in 7 Ways
In the exclusinve interview with Blockchain.News, Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky shares the latest trend on cybersecurity threats in crypto fundraising and how Kaspersky's solutions can protect investors in 7 ways.
Origin Protocol Puts $1 Million Bounty on Hacker As OUSD Stablecoin Loses Stability
Origin has now announced a $1 million bounty reward for anyone who can bring the hacker responsible for destabilizing its stablecoin to justice.
Kraken’s Ethereum 2.0 Staking Service Is a Success, With More Than 100,000 ETH Secured
US-based Kraken has been among the crypto exchanges that has welcomed Ethereum 2.0 staking with open arms.
Is China Hacking Australia? Cryptojacking Cyberattacks Hit Hard Down Under
The Australian Cyber Security Center has published a report highlighting vulnerabilities that are being exploited by hackers using cryptojacking malware.
Zcash Bug Could Leak Full Nodes with Shielded IP Addresses
Duke Leto, a core developer at Komodo (KMD), recently published a blog on his personal website revealing that, “A bug has existed for all shielded address since the inception of Zcash and Zcash Protocol.” Leto explained, “That is, Alice giving Bob a zaddr to be paid, could actually allow Bob to discover Alice’s IP address. This is drastically against the design of Zcash Protocol.”
PAID Network DeFi Platform Attacked as Hacker Gains $3 Million Of ETH After Minting $166 Million Of Tokens
PAID token crashed by over 75% instantly after the popular PAID Network DeFi protocol experienced a massive hack.
Can Blockchain Strengthen the Internet of Things (IoT)?
IoT and Blockchain are two disruptive technologies leveraged for numerous technological innovations across multiple industries, but how do they complement each other?
Ethereum Calls On Hackers to Attack Ethereum 2.0 in Exchange for Bug Bounty
With Ethereum's plans to launch its 2.0 protocol network, the open-source platform has also decided to tweak its blockchain project to perfection by calling all hackers and challenging them to break into two Ethereum 2.0 attack networks.