Crypto

Bitcoin down: 51% attack? No, put the blame on Elon Musk

The price of Bitcoin falls after Elon Musk declared that its company, Tesla, may have sold holdings of the cryptocurrency…

5 years ago

Scheme flooding fingerprint technique may deanonymize Tor users

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the…

5 years ago

Threat actors added thousands of Tor exit nodes to carry out SSL stripping attacks

Since early 2020, bad actors have added Tor exit nodes to the Tor network to intercep traffic to cryptocurrency-related sites…

5 years ago

WhatsApp will not deactivate accounts for not accepting new privacy terms

WhatsApp will not deactivate the accounts of users who don't accept the new privacy policy update that requires sharing data…

5 years ago

Cyber thieves move $760 million stolen in the 2016 Bitfinex heist

Over $760 million worth of Bitcoin that were stolen from cryptocurrency exchange Bitfinex in 2016 were moved to new accounts.…

5 years ago

30 Docker images downloaded 20M times in cryptojacking attacks

Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo…

5 years ago

Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports

According to a report published by researchers at PrivacySavvy, many travel companies expose users' data through their booking apps. In…

5 years ago

ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection

ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection.…

5 years ago

New Zealand-based cryptocurrency exchange Cryptopia hacked again

The New Zealand-based cryptocurrency exchange Cryptopia suffered a new cyber heist while it is in liquidation due to a 2019…

5 years ago

A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism

Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from…

5 years ago

This website uses cookies.