ltc

How much computing power as well as money is required to carry out a 51% attack on a blockchain like that of Litecoin which uses PoW as its protocol? Blockchains using the PoW consent protocol (Proof of Work) use the computing power of machines to secure data and the network that hasRead More →

crypto

After the bear market of 2018, Bitcoin has performed well in the current year. Two Chinese Bitcoin mining giants, Bitmain & Canaan, want to capitalize by taking the companies to the public. The second quarter of 2019 officially marked the end of the “crypto winter,” and saw bitcoin rally byRead More →

cryptojacking

Security experts at Palo Alto Networks discovered a worm dubbed Graboid that spreads using Docker containers. Palo Alto Networks researchers discovered a new Monero miner with worm-able capabilities, dubbed Graboid, that spreads using Docker containers. Experts discovered that to target new systems, the Graboid worm periodically queries the C&C for vulnerable hosts, in this wayRead More →

crypto

Threat researchers have newly discovered malicious code in WAV audio files, code that hackers use to mine cryptocurrencies. Hackers earn thousand of dollars per month. On Oct. 19, researchers at BlackBerry Cylance, a software company that develops antivirus programs, reported the discovery of malicious code hidden within WAV audio files. ThisRead More →