ltc

How much computing power as well as money is required to carry out a 51% attack on a blockchain like that of Litecoin which uses PoW as its protocol? Blockchains using the PoW consent protocol (Proof of Work) use the computing power of machines to secure data and the network that hasRead More →

crypto

Threat researchers have newly discovered malicious code in WAV audio files, code that hackers use to mine cryptocurrencies. Hackers earn thousand of dollars per month. On Oct. 19, researchers at BlackBerry Cylance, a software company that develops antivirus programs, reported the discovery of malicious code hidden within WAV audio files. ThisRead More →

crypto

French law enforcement authorities recently have been able to shut down a major Monero (XMR) cryptojacking operation. According to the Cybercrime Fighting Center (C3N), the malware, known as Retadup Monero, infected a total of 850,000 computers before the authorities could finally finish its activities by tricking it. As reported by BBC, the police teamRead More →

andoid

The mobile banking trojan has a few unusual features and bears watching, researchers said. A never-before-seen Android banking trojan, dubbed Cerberus, is being rented out on underground forums by a threat group that likes to engage with the defense community publicly via Twitter. According to a Tuesday posting from ThreatFabric, Cerberus isn’tRead More →