Decentralized Identity: How Microsoft (and Others) Plan to Empower Users to Own and Control Personal Data

Microsoft continues its blockchain streak, empowering users to own personal data. Microsoft, one of the world’s largest software makers by revenue, is currently on a blockchain streak. This time, Microsoft presented a vast blockchain-related plan: a decentralized identity (DID) network built atop of the bitcoin network, which can potentially empower users all over the internet […]

Continue Reading

Crypto Wallet Startup Ledger Detects Phishing Malware Targeting Desktop App

Hardware crypto wallet manufacturer Ledger has detected malware targeting its desktop app. Hardware cryptocurrency wallet manufacturer Ledger has detected malware targeting its desktop application, according to a tweet on April 25. Ledger warned its users that the malware locally replaces the Ledger Live desktop app with a malicious one, and advised to follow security practices […]

Continue Reading

New Crypto Mining Malware Beapy Uses Leaked NSA Hacking Tools: Symantec Research

New cryptojacking malware Beapy uses the leaked U.S. NSA hacking tools to spread through corporate networks. American software security firm Symantec found a spike in a new crypto mining malware that  mainly targets enterprises, TechCrunch reports on April 25. The new cryptojacking malware, dubbed Beapy, uses the leaked United States National Security Agency (NSA) hacking […]

Continue Reading

‘Blockchain Bandit’ Has Stolen 45,000 ETH by Guessing Weak Private Keys, Report Claims

A sophisticated hacker is siphoning money from crypto wallets with weak private keys, according to a senior security analyst. A “blockchain bandit” has managed to amass almost 45,000 ether (ETH) by successfully guessing weak private keys, according to a report released by Independent Security Evaluators on April 23. Adrian Bednarek, a senior security analyst, said he discovered […]

Continue Reading