Hackers:
The Ledger Nano S is the most widely used multi-currency hardware wallet in the cryptoverse. It’s the only hardware wallet that features a secure chip with a custom operating system. Since its inception in 2014, the company has grown by leaps and bounds. The Ledger Nano now supports over 1,100 currencies thanks to its compatibility with other mainstream wallet
Hackers:
Ethereum classic, a spin-off of the world’s second most popular cryptocurrency, has been hit by a series of major attacks on its blockchain network.Unknown hackers made away with more than $1.5 million (£1.2m) by performing a so-called 51 per cent attack on ethereum classic’s underlying technology. Popular cryptocurrency exchange Coinbase was forced to cease tr
There was a lot to take from the various dramas that played out in the crypto space in 2018. One of the positivity the crypto community can revel in is the fact that the crypto market is more tenacious than we thought as it survived disappointments that threatened to expose the frailties of the burgeoning market.
the European crypto community, in particular, ended the year in
The possibility of having an SEC-approved Bitcoin ETF was one of the major highlights of 2018 as the crypto space took a step closer to the mainstream adoption. However, it was the introduction of an ETP in Switzerland that remarkably put crypto back on the spotlight after months of lows, especially in the crypto market.
The major stock exchange in Switzerland, SIX Swiss Excha
Hackers:
In what seems to be one of the first major security breaches of 2019, New Zealand-based digital assets exchange Cryptopia was allegedly hacked this week. The platform reported the incident via Twitter on January 15, mentioning “significant losses.” While the incident has been confirmed by the local police, many crucial details, including the amount and types of st
Hackers:
Troy Kent, a threat researcher at Awake Security, presented findings at the InfoSecurity North America Conference in New York earlier this month. His findings pertained to various crypto mining software venerability’s which could allow hackers to access computers on which the software is running to steal files, intellectual property, and even login credentials.
T