All posts in Cryptocurrency
22 Nov, 2023
Android, Banking, Blockchain, Business Email Compromise, cloud, Cryptocurrency, CXO, cybercrime, cyberespionage, Cybersecurity, Data Breaches, finance sector, International, Malware, Mobile Security, Open Source, Phishing, Ransomware, Security, Security News, supply chain attacks
0

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most . . . Read more
07 Nov, 2023
Australia, Blockchain, crypto, crypto assets, crypto regulation, Cryptocurrency, CXO, digital assets, financial technology, fintech, Innovation, International, Security, Security News
0

The Australian government is moving towards regulating cryptocurrency, with a focus on those involved in developing and maintaining crypto platforms. Bitcoin crypto currency coin with cracked Australia flag. Crypto restrictions. Australia’s Treasury Department recently released a proposal paper on regulating digital asset platforms, aiming to support innovation while addressing consumer . . . Read more
10 Aug, 2023
bust, Cryptocurrency, Cryptography, cybercrime, Data leakage, Data loss, Hacking, Intel, Law & order, Naked Security Podcast, podcast, Security News, surveillance
0

by Paul Ducklin SNOOPING ON MEMORY, KEYSTROKES AND CRYPTOCOINS No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify and anywhere that good podcasts are found. Or . . . Read more
04 Aug, 2023
Bitfinex, BTC, Crocodile, Cryptocurrency, cryptoheist, doj, Law & order, Lichtenstein, Morgan, Razzlekhan, Security News
0

by Paul Ducklin Back in August 2016, Heather Morgan, a.k.a. Razzlekhan, a.k.a. the Crocodile of Wall Street (actually, there’s a double-barrelled expletive in front of the word ‘crocodile’, but this is a family-friendly website so we’ll leave you to extrapolate for yourself), and her husband Ilya Lichtenstein got their hands . . . Read more
29 Jun, 2023
Apple, bust, Cryptocurrency, cybercrime, Data loss, Hacking, iPhone, Law & order, Malware, Naked Security Podcast, podcast, Privacy, Security News, twitter, Vulnerability, zero day
0

by Paul Ducklin PONG FOR ONE!? No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher and anywhere that good podcasts are found. Or just drop . . . Read more

by Naked Security writer Some hacks become so notorious that they acquire a definite article, even if the word THE ends up attached to a very general technical term. For example, you can probably trot out the names of dozens of well-known internet worms amongst the millions that exist in . . . Read more
21 Jun, 2023
botnet, Cryptocurrency, cryptojacking, DDoS, Malware, password guessing, Security News, SSH, XMRig, zombie malware
0

by Paul Ducklin Researchers at Korean anti-malware business AhnLab are warning about an old-school attack that they say they’re seeing a lot of these days, where cybercriminals guess their way into Linux shell servers and use them as jumping-off points for further attacks, often against innocent third parties. The payloads . . . Read more

by Naked Security writer Remember Mt. Gox? Originally, it was a card-trading site called MTGOX, short for Magic The Gathering Online Exchange (there was no sense of “Mountain” in the name at all), but the domain changed hands and purpose in the early days of cryptocurrency. Operated out of Japan . . . Read more
23 Mar, 2023
aCropalypse, BTC, Cryptocurrency, cybercrime, Data loss, google, Microsoft, podcast, Security News, Vulnerability
0

by Paul Ducklin DELETED DATA THAT JUST WON’T GO AWAY The mobile phone bugs that Google kept quiet, just in case. The mysterious case of ATM video uploads. When redacted data springs back to life. No audio player below? Listen directly on Soundcloud. With Paul Ducklin and Chester Wisniewski. Intro . . . Read more

by Paul Ducklin There are plenty of military puns in operating system history. Unix famously has a whole raft of personnel known as Major Number, who organise the batallions of devices such as disk drives, keyboards and webcams in your system. Microsoft once struggled with the apparently incompetent General Failure, . . . Read more