In our “Security” section, we cover cybersecurity issues, risks, and protective technologies in the cryptocurrency and blockchain ecosystem. Here you will find information about hacks, fraud schemes, wallet security, and best practices for protecting digital assets. Read the “Security” section on ForkNews to learn how to keep your crypto funds safe.
A popular Mac calendar app has disappeared from the App Store after it was found to be mining cryptocurrency without users' permission.
As bad as it is with hackers and dodgy websites trying to hijack your computer's processing power to mine cryptocurrency, there's always something worse to come - it was recently reported that some internet providers have been caught doing similar activity.
The social network has already blocked even several well-known verified accounts, which is already too much to start the fight against Twitter scams, CoinDesk reports.
Cybersecurity experts at Palo Alto Networks discovered a virus called ComboJack while monitoring an email phishing campaign that targeted customers in Japan and the United States.
After several months of calm, DDoS hackers became active again and began to destroy websites. Recently, attackers have carried out a number of attacks using a new method of overloading victims' servers with fake traffic. To make attacks more powerful, hackers began using servers that help speed up sites - CDN servers for distributed caching in RAM.
Experts from University College London studied smart contracts in the Ethereum network and discovered more than 34 thousand vulnerabilities that provide hackers with the ability to easily hack programs and connect to their control. However, the researchers noted that they are not sure that they have discovered all possible vulnerabilities.
According to Aljazeera, four criminals were detained in the city of Taichung. The attackers lured the owner of 18 BTS to a meeting, at which they forced him to transfer cryptocurrency to a specified address, and then beat him.
Dozens of hackers are trying to find the thieves of cryptocurrency stolen from the Coincheck exchange. While it is unknown who was involved in the theft, white hat hackers played a key role in tracking down the stolen currency. One such hacker, who calls himself JK17 on Twitter, identified the accounts into which money was moved shortly after the theft and then began monitoring those accounts. This information was then passed on to the NEM Foundation, an international group that mana...
Join us!