Remove Facebook scams (August , 2018)

Facebook creates the perfect environment for scams to flourish
With around 2.2 billion monthly active users, Facebook is the perfect place for scammers to do their thing. There are thousands or even millions of vulnerable users, and what better place is there for people looking to take advantage of others. You could encounter all kinds of different scams, from the silly…

9 Ways to Hack Your Bitcoin Wallet

1. Email Phishing
An email arrives in your inbox, seemingly from a service you are familiar with or have used before. The email looks completely legitimate, but it is not. Hackers make their phishing emails look identical to legitimate service emails, with the same formats and design used, thus it can be difficult to differentiate them. In some cases, the company…

ICO Hacking 2018

Hacking Bitcoin Mining Pools and Exchanges
Hacking a Bitcoin mining pool can be useful to crooks as the process involves using the processing power of a group of Bitcoin miners for one’s own benefit. However, doing so is a complicated process. The hackers need to target ISPs and compromise the Border Gateway Protocol (BGP) service, which connects different networks. By compromising…

Cybersecurity news headlines (July 1 – July 15)

July has been a pretty quiet month so far but we do have a couple of headlines to report. There were a couple of data breaches, military information stolen, users threatened with their porn viewing habits and the never ending Facebook controversy. But we did not witness any major incidents so it’s been relatively peaceful.…

Cybersecurity news headlines (Jun 1 – Jun 31)

June has been a worrying month in regards to data breaches. Three major companies, including one of the biggest sportswear manufacturers Adidas, have revealed that they have suffered data breaches, which resulted in customer data being accesses by unauthorized parties. Two South Korean cryptocurrency exchange services have reported hacks, which led to tens of millions of dollars stolen. In other…

Wipersoft Represent ACESO Network

Since its release 3 years ago, our centralized anti-malware software WiperSoft has attracted over 1 million users in 100 different countries. While the program has been a success, we want to take protection against malware to the next level by using blockchain. This is where ACESO comes in, a user to user cyber threat intelligence platform. What exactly is ACESO,…

Security risks associated with blockchain

With the popularity of cryptocurrencies, particularly the widespread attention for Bitcoin, blockchain has gained a lot of traction in recent years. Many businesses are looking to adopt the technology as it is believed it will revolutionize the Internet itself. It provides a secure way to make transactions and smart contracts, as everything is verified by multiple participants. However, as secure…

Cybersecurity news headlines (May 1 – May 31)

May was the month a lot of companies all over the world were dreading. May 25th marked the day when the new data protection laws in Europe come into place, the laws that were announced two years ago. Companies had two years to comply with the new regulations but many of them left it to the last minute, resulting in…