Earlier this month, I and others wrote a letter to Congress, basically saying that cryptocurrencies are an complete and total disaster, and urging them to regulate the space. Nothing in that letter is out of the ordinary, and is in line with what I wro…
Tag: cryptocurrency
Security Vendor News
S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast + Transcript]
by Paul Ducklin •
Latest epsiode – listen (or read) now!
North America
Recovering Ransom Payments: Is This the End of Ransomware?
by Jonathan Reed •
What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits. Ransomware is still today’s top attack […]
The post Recovering Ransom Payments: Is This the End of Ransomware? appeared first on Security Intelligence.
Global Security News, North America
Keeping pace with emerging threats: The roundup
by Help Net Security •
Egress issued its mid-year 2022 threat report offering details of emerging threats along with insights about protecting employees, customers, and businesses from these specific cyberattacks. The report provides comprehensive details about threats assoc…
Global IT News
Round13 launches a dedicated fund to invest in blockchain and digital asset market; raises US$70 million to date
by Pragya Sehgal •
Toronto-based venture capital firm Round13 has launched a dedicated, crypto native fund to invest in the emerging blockchain and digital asset market
The post Round13 launches a dedicated fund to invest in blockchain and digital asset market; raises US$70 million to date first appeared on IT World Canada.
Uncategorized
Smashing Security podcast #274: Hands off my biometrics, and a wormhole squirmish
by Graham Cluley •
Clearview AI receives something of a slap in the face, and who is wrestling over an internet wormhole?
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley …
Europe, Global Security News, North America, Vulnerabilities
National Security Memo Highlights Quantum Computing Risks
by Nathan Eddy •
A White House memo directed at federal agencies aims to jumpstart efforts to move vulnerable security systems to a quantum-resistant cryptography security posture and maintain investment in quantum computing technology. The document, released on May …
North America
New DOJ Team Focuses on Ransomware and Cryptocurrency Crime
by Jonathan Reed •
While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence […]
The post New DOJ Team Focuses on Ransomware and Cryptocurrency Crime appeared first on Security Intelligence.
Security Vendor News
Crypto Scammers exploit talk on Cryptocurrency
by McAfee Labs •

By Oliver Devane McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called…
The post Crypto Scammers exploit talk on Cryptocurrency appeared first on McAfee Blog.
Security Vendor News
Instagram Hack Results in $1 Million Loss in NFTs
by McAfee •

Imagine – your favorite brand on Instagram just announced a giveaway. You’ll receive a free gift! All you have to…
The post Instagram Hack Results in $1 Million Loss in NFTs appeared first on McAfee Blog.
Europe, Global Security News, North America
New Dog, Old Tricks: Reducing Cryptocurrency Phishing Vulnerabilities
by Eyal Benishti •
For the security-minded, the rise of cryptocurrencies has been both a blessing and a curse. Coins like as Bitcoin and Ethereum theoretically offer a higher degree of protection and privacy than traditional banking, especially in an online world where …
Malware Indicators (IoCs), Vulnerabilities
An Ever Surf Wallet Vulnerability Could Allow Crypto Thefts
by Abeerah Hashim •
Researchers have found a severe vulnerability in the Everscale blockchain wallet “Ever Surf.” Exploiting this…
An Ever Surf Wallet Vulnerability Could Allow Crypto Thefts on Latest Hacking News.
Uncategorized
Smashing Security podcast #272: Going ape over the Kardashians, and the face of romance scams
by Graham Cluley •
Members of The Bored Ape Yacht Club get that sinking feeling, a face unwittingly launches hundreds of romance scams, and is an as-yet unseen Kim Kardashian sex tape a load of old Roblox?
All this and much more is discussed in the latest edition of t…
North America
QR Code Security: How Your Business Can Use Them Responsibly
by Jennifer Gregory •
The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]
The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.
Security Bloggers, Security Vendor News
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of April 18, 2022
by Dylan D'Silva •
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of April 18, 2022. I’ve als…
Security Vendor News
S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast]
by Paul Ducklin •
Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode – listen now!
Uncategorized
Smashing Security podcast #271: Crypto break-in, Google blurring, and mics not muting
by Graham Cluley •
A man loses $650,000 from his cryptocurrency wallet after his Apple iCloud account is hacked, video conferencing apps may not be muting your mic quite the way you imagined, and Google has unblurred military bases in Russia… or has it?
All this an…
Uncategorized
Apple iCloud account attack results in man losing $650,000 from his cryptocurrency wallet
by Graham Cluley •
Cryptocurrency wallet maker MetaMask has warned its 21 million monthly users to be wary of Apple iCloud backing up their app’s data by default, after attackers successfully stole $650,000 of funds and NFTs.
Read more in my article on the Hot for Sec…
Security Vendor News
$625 Million Stolen in Latest Crypto Attack: 5 Tips on How to Use Digital Currency Safely
by McAfee •

Cryptocurrency is all the rage these days and it doesn’t seem to be slowing down any time soon. As more…
The post $625 Million Stolen in Latest Crypto Attack: 5 Tips on How to Use Digital Currency Safely appeared first on McAfee Blog.
Global Security News, North America
Crypto-related phishing and how to avoid it
by Help Net Security •
In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency industry. Cryptocurrencies arenR…
Security Vendor News
Beanstalk cryptocurrency heist: scammer votes himself all the money
by Paul Ducklin •
Voting safeguards based on commuity collateral don’t work if one person can use a momentary loan to “become” 75% of the community.
Security Bloggers
Episode 237: Jacked on the Beanstalk – DeFi’s Security Debt Runs Wide, Deep
by Paul Roberts •
The hack of Beanstalk is just the latest major compromise of a decentralized finance (DeFi) platform. In this podcast, Jennifer Fernick of NCC Group joins me to talk about why DeFi’s security woes are much bigger than Beanstalk.
The post Episode 237: …
North America
Top Security Concerns When Accepting Crypto Payment
by Jonathan Reed •
From Microsoft to AT&T to Home Depot, more companies are accepting cryptocurrency as a way to pay for products and services. This makes perfect sense as crypto coins are a viable revenue source. Perhaps the time is ripe for businesses to learn how to receive, process and convert crypto payments into fiat currency. Still, many […]
The post Top Security Concerns When Accepting Crypto Payment appeared first on Security Intelligence.
Malware Indicators (IoCs), Vulnerabilities
Rarible NFT Marketplace Bug Could Allow Crypto Assets Theft
by Abeerah Hashim •
Researchers have discovered how a security bug in the Rarible NFT marketplace could lead to…
Rarible NFT Marketplace Bug Could Allow Crypto Assets Theft on Latest Hacking News.
Global Security News, North America
Spreading malware through community phishing
by Help Net Security •
In this video for Help Net Security, Maor Hizkiev, Senior Director Software Engineering at Datto, talks about a recently analyzed community phishing campaign revolving around Nvidia. This phishing campaign started back in 2020, when Nvidia released the…
Security Vendor News
S3 Ep78: Darkweb hydra, Ruby, quantum computing, and a robot revolution [Podcast]
by Paul Ducklin •
Latest episode – listen now!
Security Vendor News
US cryptocurrency coder gets 5 years for North Korea sanctions busting
by Naked Security writer •
Cryptocurrency expert didn’t take “No” for an answer when the US authorities said he couldn’t pursue cryptocoin opps in North Korea.
Europe, Global Security News, North America
De-anonymizing Bitcoin
by Bruce Schneier •
Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring.
Within a few years of Bitcoin’s arrival, academic security researchers — and then com…
Global Security News, North America
Cybersecurity must be at the forefront of a blockchain project
by Help Net Security •
In this video for Help Net Security, Dr. Dmitry Mikhailov, CTO at Farcana Metaverse, talks about cybersecurity in the crypto industry and the vulnerability of a blockchain project. Crypto industry is very young, but has a huge capitalization. Many comp…
Uncategorized
Smashing Security podcast #269: Trezor Deep Throat, a CCTV stalker, and Amazon’s list of banned words
by Graham Cluley •
There’s monkey business involving cryptocurrency thieves and MailChimp, a stalker exploits his ex-partner’s CCTV cameras, and what are the naughty words Amazon doesn’t want its staff using?
All this and much more is discussed in the latest edition o…
Security Vendor News
Serious Security: Darkweb drugs market Hydra taken offline by German police
by Paul Ducklin •
Why are Tor sites hard to locate and therefore difficult to take down? We explain in plain English…
Global Security News, North America
Malicious actors targeting the cloud for cryptocurrency-mining activities
by Help Net Security •
Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could result in profits for the perpetrators. That’s why we’re seeing a…
Uncategorized
Trezor wallets hacked? Don’t be duped by phishing attack email
by Graham Cluley •
Owners of physical Trezor cryptocurrency wallets should be on their guard after an email was sent out by thieves attempting to dupe them into downloading new software to their devices.
Global Security News, North America
Why do organizations need to prioritize cyber resiliency?
by Help Net Security •
OpenText announced a report which provides in-depth analysis, market insights, trend data, and predictions for what lies ahead as organizations move toward strengthening their cyber resiliency posture in the face of ever-increasing cyberattacks and cyb…
Global Security News, North America
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet
by Help Net Security •
Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for disparate ideas all pointing in the direction of making the internet more dec…
Europe, Global Security News, North America
How to Identify and Avoid DeFi Liquidity Scams
by Dmitry Mishunin •
The cryptocurrency market is growing, and more decentralized protocols and tokens are coming on the scene every day. However, a sizable chunk of new ones turn out to be a waste of time or fake if you bother to invest your money in them. According to s…
Europe, Global Security News, North America
A HyFi Approach Should be the Answer to DeFi Security
by Andersen Cheng •
I will be the first to admit to my prior skepticism with regards to cryptocurrencies and other sorts of decentralized finance (DeFi). Having spent most of my career immersed in securing centralized structures and in the world of traditional finance (T…
Malware Indicators (IoCs)
Trojanized Crypto Wallets Flood Android And iOS App Stores
by Abeerah Hashim •
Heads up, crypto users! A flurry of trojanized crypto wallets mimicking popular services has emerged…
Trojanized Crypto Wallets Flood Android And iOS App Stores on Latest Hacking News.
Global Security News, North America
Cybercriminals focusing on crypto donations to Ukraine to trick victims
by Help Net Security •
As the war in Ukraine unfolded, one way of helping was to donate cryptocurrency which resulted in over $50 million in crypto donations. Cybercriminals were quick to move and take advantage of this lucrative situation and inattentive victims. The Cyren …
Security Vendor News
UK police arrest 7 hacking suspects – have they bust the LAPSUS$ gang?
by Naked Security writer •
Seven alleged hackers have been arrested in the UK. But who are they, and which hacking crew are they from?