Transaction spam attack: Next Steps

Today the network was attacked by a transaction spam attack that repeatedly called the EXTCODESIZE opcode (see trace sample here), thereby creating blocks that take up to 20-60 seconds to…

Read More »

The History of Casper – Chapter 2

This chapter describes the game theory and economic security modelling we were doing in the Fall of 2014. It recounts how the “bribing attacker model” led our research directly to…

Read More »

‘Biggest cyber risk is complacency, not hackers’ – UK Information Commissioner issues warning as construction company fined £4.4 million

The UK Information Commissioner has warned that companies are leaving themselves open to cyber attack by ignoring crucial measures like updating software and training staff.

Read More »

Blockchain could Help Fight Cyber Abuse and Trolling

For a couple of decades, people have misused the anonymity features of most cyber platforms to attack, abuse or harm others and this has been a big problem to society….

Read More »

Crypto.com Launches Anti-Phishing Code for App Users

Protect your account with an added level of security Today, we are rolling out the Anti-Phishing Code feature in the Crypto.com App to help users protect themselves from phishing attempts….

Read More »

Microsoft Advises Miners and Organizations to Build Their Resilience against Cyberattacks

There are some kinds of cyberattacks that blend in the ordinary network activity, so they are very easy to miss. How should an organization protect oneself against them?

Read More »

Geth security release

Critical patch for CVE-2020-28362 – Summary Versions of geth built with Go <1.15.5 or <1.14.12 are most likely affected by a critical DoS-related security vulnerability. The golang team has registered…

Read More »

Ukraine Rolls Out Cybercrime Bill That Defines Illegal Use Of Cryptocurrencies

The authorities of Ukraine have recently rolled out a new bill combating cybercrime that also describes the procedure for the confiscation of cryptocurrencies obtained illegally.

Read More »

Windows Devices Are Vulnerable to Credential Stealing Malware

Various uncommon types of viruses have been created by cyber attackers and are now being used to attack cryptocurrency holders.

Read More »

Brave browser adds new tricks to protect crypto users from phishing attacks

The privacy-based browser is adding anti-phishing solutions from PhishFort.

Read More »