Security


Tech

Google Down: The Perils of Centralization

It was a jarring reminder of the hidden costs of the easy-to-use, centralized systems that permeate the web, and just how taxing or debilitating they can be.

No signal TV test pattern background

Finance

Australian Crypto Exchange Exposes Personal Data of 270K Users

BTC Markets, one of Australia's biggest cryptocurrency exchanges, has accidentally exposed users' data, raising the risk of phishing attacks.

timon-studler-ABGaVhJxwDQ-unsplash

Finance

Twitter Hires Noted Hacker as Head of Security Months After Bitcoin Scam

Twitter has hired Peiter Zatko, a prominent white-hat hacker going by the handle "Mudge," to help prevent future security breaches.

Joseph O’Conner was accused of participating in a Twitter cryptocurrency scam.

Markets

Crypto.com: We Got the Highest Ratings on Privacy, Security Based on US Standards

The crypto exchange and finance platform said it got high ratings for privacy and security using standards developed by a U.S. government agency.

CCTV

Tech

Ethereum Classic's MESS Solution Won't Provide 'Robust' Security Against 51% Attacks: Report

A solution being implemented to safeguard against so-called 51% attacks on the Ethereum Classic (ETC) network may not be as secure as suggested, according to a new analysis.

Steam gauge

Tech

Downvoted: Security Researchers Slam Voatz Over Stance on White-Hat Hackers

A broad ruling on the Computer Fraud and Abuse Act could “chill” security research by white-hat hackers, making tech less secure.

Voatz white-hat security research

Tech

The Web Wasn’t Built for Privacy, but It Could Be

Because privacy means different things to different people, a privacy-focused internet is unlikely to please everyone. But it should offer greater personal control.

hacker-4031973_1920

Finance

Twitter Tightens Security Ahead of US Presidential Election

Twitter is making a host of new security measures compulsory for accounts belonging to users considered influential in the upcoming election.

Twitter phone box

Tech

Voatz Calls for Restrictions on Independent Cybersecurity Research in Supreme Court Brief

Blockchain voting platform Voatz wrote that bug bounty programs are beneficial – provided researchers only operate under the supervision of the companies they’re looking into.

Voatz app (Danny Nelson/CoinDesk)

Tech

Hardware Wallet Flaw Lets Attackers Hold Crypto for Ransom Without Touching Device

A hypothetical man-in-the-middle attack would have allowed an attacker to hold users’ crypto for ransom on Trezor and KeepKey hardware wallets.

(Jose Fontano/Unsplash)