#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

digital currency | Breaking Cybersecurity News | The Hacker News

Warning: Android Bitcoin wallet apps vulnerable to theft

Warning: Android Bitcoin wallet apps vulnerable to theft
Aug 13, 2013
A critical vulnerability in the Android implementation of the Java SecureRandom random number generator was discovered , that leaves Bitcoin digital wallets on the mobile platform vulnerable to theft. Before the announcement was made, users on the forums had noticed over 55 BTC were stolen a few hours after the client improperly signed a transaction using the compromised random number generator. Bitcoin is a virtual currency that makes use of cryptography to create and transfer bitcoins. Users make use of digital wallets to store bitcoin addresses from which bitcoins are received or sent. Bitcoin uses public-key cryptography so that each address is associated with a pair of mathematically linked public and private keys that are held in the wallet. Because the problem is rooted in the operating system, every Bitcoin digital wallet generated by an Android app is affected by the weakness, including Bitcoin Wallet , blockchain.info wallet , Bitcoin Spinner , and Myc

Bitcoin mining malware found in E-Sports Entertainment (ESEA) software

Bitcoin mining malware found in E-Sports Entertainment (ESEA) software
May 02, 2013
The Bitcoin mining rig is becoming a popular alternative to people who want an easy way to earn the digital currency. All you have to do is plug the hardware that specializes in Bitcoin mining and run its customized software. After that, you can sit back and relax as it mines the digital currency for you. A popular eSports league has admitted that one of its employees harnessed the power of member's computers without their knowledge in order to mine Bitcoins. For a period of 2 weeks, gamers noticed that their computers were generating unusually high GPU loads and frequent BSOD errors. Some gamers stated that their GPUs were damaged due to them reaching temperatures above 90 degrees Celsius. The mining began on April 13th and affected thousands of gamers, who unwittingly mined over $3,700 worth of the currency. Eric Thunberg, co-owner of ESEA, stated that the Bitcoin miner was meant to be part of an April Fools joke, however, they weren't able to finish it in time. They then de

Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!
Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Cybersecurity Resources