cryptocurrency

New Bezop Cryptocurrency (BEZ) leaks Personal details for 25k usersNew Bezop Cryptocurrency (BEZ) leaks Personal details for 25k users

New Bezop Cryptocurrency (BEZ) leaks Personal details for 25k users

Security experts at Kromtech discovered a MongoDB exposed personal details of 25,000 users tied to the Bezop cryptocurrency. Security researchers…

7 years ago
BeatCoin – Researchers demonstrate how to steal Cold Wallet Keys from Air-Gapped PCsBeatCoin – Researchers demonstrate how to steal Cold Wallet Keys from Air-Gapped PCs

BeatCoin – Researchers demonstrate how to steal Cold Wallet Keys from Air-Gapped PCs

Israeli researchers presented their new research named BeatCoin, it is an experiment wherein they demonstrate how to steal private keys for…

7 years ago
Attackers Fake Computational Power to Steal Cryptocurrencies from equihash Mining PoolsAttackers Fake Computational Power to Steal Cryptocurrencies from equihash Mining Pools

Attackers Fake Computational Power to Steal Cryptocurrencies from equihash Mining Pools

Security experts at 360 Core Security have recently detected a new type of attack which targets some equihash mining pools. After…

7 years ago
Bitcoin web wallet addresses generated with a flawed library are exposed to brute-force attacksBitcoin web wallet addresses generated with a flawed library are exposed to brute-force attacks

Bitcoin web wallet addresses generated with a flawed library are exposed to brute-force attacks

Multiple vulnerabilities in the SecureRandom() function expose Bitcoin web wallet addresses generated by the flawed library to brute-force attacks. Old…

7 years ago
Google to banish cryptocurrency mining extensions from official Chrome Web StoreGoogle to banish cryptocurrency mining extensions from official Chrome Web Store

Google to banish cryptocurrency mining extensions from official Chrome Web Store

Google will ban cryptocurrency mining extensions from the official Chrome Web Store after finding many of them abusing users' resources…

7 years ago
Dofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hoursDofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hours

Dofoil Trojan used to deploy cryptocurrency miner on more than 500,000 PCs in a few hours

Microsoft experts observed more than more than 500,000 computers infected with Dofoil Trojan used to download a cryptocurrency miner. A few…

7 years ago
ComboJack Malware alters Windows clipboards to steal cryptocurrencies and paymentsComboJack Malware alters Windows clipboards to steal cryptocurrencies and payments

ComboJack Malware alters Windows clipboards to steal cryptocurrencies and payments

Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and…

7 years ago
Hackers compromised a Tesla Internal Servers with a Cryptocurrency minerHackers compromised a Tesla Internal Servers with a Cryptocurrency miner

Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner

Cloud security firm RedLock discovered that hackers have compromised the Tesla cloud computing platform to mine cryptocurrency. Tesla has confirmed…

7 years ago
Cybersecurity week Round-Up (2018, Week 6)Cybersecurity week Round-Up (2018, Week 6)

Cybersecurity week Round-Up (2018, Week 6)

Cybersecurity week Round-Up (2018, Week 6) -Let's try to summarize the most important event occurred last week in 3 minutes.…

7 years ago
Cybersecurity week Round-Up (2018, Week 5)Cybersecurity week Round-Up (2018, Week 5)

Cybersecurity week Round-Up (2018, Week 5)

Cybersecurity week Round-Up (2018, Week 5) -Let's try to summarize the most important event occurred last week in 3 minutes.…

7 years ago