- Back to menuPrices
- Back to menuResearch
- Back to menuConsensus
- Back to menu
- Back to menu
- Back to menu
- Back to menuWebinars & Events
Security
Google Down: The Perils of Centralization
It was a jarring reminder of the hidden costs of the easy-to-use, centralized systems that permeate the web, and just how taxing or debilitating they can be.

Australian Crypto Exchange Exposes Personal Data of 270K Users
BTC Markets, one of Australia's biggest cryptocurrency exchanges, has accidentally exposed users' data, raising the risk of phishing attacks.

Twitter Hires Noted Hacker as Head of Security Months After Bitcoin Scam
Twitter has hired Peiter Zatko, a prominent white-hat hacker going by the handle "Mudge," to help prevent future security breaches.

Crypto.com: We Got the Highest Ratings on Privacy, Security Based on US Standards
The crypto exchange and finance platform said it got high ratings for privacy and security using standards developed by a U.S. government agency.

Ethereum Classic's MESS Solution Won't Provide 'Robust' Security Against 51% Attacks: Report
A solution being implemented to safeguard against so-called 51% attacks on the Ethereum Classic (ETC) network may not be as secure as suggested, according to a new analysis.

Downvoted: Security Researchers Slam Voatz Over Stance on White-Hat Hackers
A broad ruling on the Computer Fraud and Abuse Act could “chill” security research by white-hat hackers, making tech less secure.

The Web Wasn’t Built for Privacy, but It Could Be
Because privacy means different things to different people, a privacy-focused internet is unlikely to please everyone. But it should offer greater personal control.

Twitter Tightens Security Ahead of US Presidential Election
Twitter is making a host of new security measures compulsory for accounts belonging to users considered influential in the upcoming election.

Voatz Calls for Restrictions on Independent Cybersecurity Research in Supreme Court Brief
Blockchain voting platform Voatz wrote that bug bounty programs are beneficial – provided researchers only operate under the supervision of the companies they’re looking into.

Hardware Wallet Flaw Lets Attackers Hold Crypto for Ransom Without Touching Device
A hypothetical man-in-the-middle attack would have allowed an attacker to hold users’ crypto for ransom on Trezor and KeepKey hardware wallets.
