Please turn on your JavaScript for this page to function normally.
NiceHash
NiceHash suffers security breach, around $70 million in Bitcoin stolen

NiceHash, one of the most popular crypto-mining marketplaces, has apparently suffered a breach that resulted in the theft of the entire contents of the NiceHash Bitcoin …

DDoS
DDoS attackers increasingly targeting cryptocurrency exchanges

The extraordinary volatility of the price of bitcoin has spurred speculators to employ a wide variety of tricks to make it swing between extremes, so that they can take …

bitcoin
How secure are cryptocurrency mobile apps?

Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? …

SF
Stealthy in-browser cryptomining continues even after you close window

In-browser cryptocurrency mining is, in theory, a neat idea: make users’ computers “mine” Monero for website owners so they don’t have to bombard users …

hand
The Wild West of drive-by cryptocurrency mining

As more and more Coinhive clones continue popping up, chances of users’ CPU power being hijacked for cryptocurrency mining are rising. According to Malwarebytes’ …

Bitcoin
Have you heard about Bitcoin multipliers?

Professedly, they are services that multiply any Bitcoin amount you send them by several times, and return to you the total amount in a mere hours. How do they do that? …

Android
Cryptocurrency-mining script planted in apps on Google Play

Coinhive’s cryptocurrency-mining script has found its way into mobile apps offered on Google Play. Trend Micro researchers have spotted two apps that have been equipped …

Coinhive
Coinhive breached due to old, reused password

Coinhive has suffered another setback: their DNS records have been surreptitiously changed by attackers, allowing them to steal cryptocurrency mined via the project’s …

bitcoin
Hackers use organizations’ resources for stealthy cryptocurrency mining

Hackers lusting after cryptocurrency but not wanting to spend money to buy it or mine it are targeting users wallets, computers, popular Web sites and public cloud computing …

Bitcoin
How to keep your cryptocoins safe?

Intrigued by the many possibilities of cryptocurrencies – not least by the prospect to “earn” serious money while doing nothing – you’ve decided …

Showtime
Showtime’s Web sites roped visitors’ CPU into mining cryptocurrency

Here’s the latest good reason for users to block JavaScript: if you don’t, your computer’s CPU power could be used to mine cryptocurrency without your …

cybercrime
Hackers stole over $500,000 from Enigma cryptocurrency investors

Unknown hackers have managed to steal over $500,000 from aspiring investors in the Enigma cryptocurrency investment platform. The Enigma cryptocurrency hack The attack …

Don't miss

Cybersecurity news