Category: Security
-
Crypto’s Dotcom Era Begins as Handshake Launches Decentralized Domains
Handshake, one of the more original crypto projects to have spawned during the ICO era, has completed its long-awaited launch. The decentralized domains registrar, founded by MIT engineers, has spent the last year in stealth mode but is now opening up to the general public. The Handshake protocol, coupled with the Namebase registrar, enables users…
-
Don’t Invest in Bitcoin Code, Bitcoin Doubler or Bitcoin Trader – They Are All Scams
Those new to crypto and with money signs in their eyes can easily be taken in by scams, and there are many, thanks to the decentralized nature of bitcoin and the lack of knowledge surrounding it for beginners. Promises of easy and incredible gains thanks to the guidance of some shadowy “bitcoin expert” or auto…
-
Lawsuit Against Ripple May Decide the Fate of XRP but Regulators Have the Final Say
A prolonged legal battle, which may hold the key to XRP’s future, has been extended again. The class action lawsuit alleges that Ripple issued and sold the coin, one of the largest by market cap, as an unregistered security. The decision on the defendant’s motion to dismiss the lawsuit has been postponed. But even a…
-
Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks
A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. Since the group’s infamous previous…
-
7 Steel Crypto Wallets That Withstand Extreme Fire and Water Damage
Cryptocurrencies have become valuable over the last few years and hardware wallets are now a mainstay within the cryptosphere. More recently, steel-crafted wallets that store crypto keys on a hard piece of metal have become increasingly popular. The following is a look at the wide variety of so-called ‘doomsday’ digital currency wallets fabricated from metal…
-
‘DNA-of-Things’ Technology Can Store Bitcoin Passwords in Everyday Objects
Talk of bitcoin passwords being encoded and stored in synthetic DNA is not new, but in a recent development scientists have announced that DNA-encoded information can now be stored in everyday objects such as eye glasses or a shirt button, instead of a vial or test tube. Also Read: Cryptosteel Capsule Will Keep Your Wallet…
-
15 Million Debit Cards Exposed as Iranian Banks Fall Victim to Cyber Warfare
The private details of 15 million bank debit cards in Iran have been published on Telegram in the largest banking security incident in the country’s history. Iranian authorities so far try to blame the breach on common criminals but cyber security experts suspect it was the work of intelligence agencies from the U.S. or Israel.…
-
The State Encourages ICO Fraud. The Free Market Minimizes It
Many Initial Coin Offerings (ICOs) have been and are frauds. The state enables this con game in various ways, including the establishment of accredited investors and the regulation of businesses that sell equity. Shut off from the most lucrative aspects of investment, average people rush into the few sources of profit still available to them.…
-
Evercoin Launches Bitcoin and Cryptocurrency Hardware Wallet
New York, NY, 12 November 2019 – At New York Consensus Invest Summit, Evercoin Inc. today announced Evercoin 2, the “safest hardware wallet”. Evercoin 2 provides a wallet and exchange for bitcoin and other cryptocurrencies featuring a hardware wallet the size of a house key powered by YubiKey 5ci, the first implementation of its kind.…
-
Trusted Friends Can Become Crypto Custodians With the Vault12 Platform
A firm called Vault12 launched its new passkey security solution for cryptocurrency assets. Vault12 is an application that allows people to enlist their trusted friends and family members to help safeguard their assets. According to the project’s creators, the new application leverages the cryptographic algorithm Shamir’s Secret Sharing which allows keys to be split in…