Cybersecurity news headlines (May 1 – May 31)

May was the month a lot of companies all over the world were dreading. May 25th marked the day when the new data protection laws in Europe come into place, the laws that were announced two years ago. Companies had two years to comply with the new regulations but many of them left it to the last minute, resulting in…

Security risks associated with blockchain

With the popularity of cryptocurrencies, particularly the widespread attention for Bitcoin, blockchain has gained a lot of traction in recent years. Many businesses are looking to adopt the technology as it is believed it will revolutionize the Internet itself. It provides a secure way to make transactions and smart contracts, as everything is verified by multiple participants. However, as secure…

Cybersecurity news headlines (April 15 – April 30)

We are back with April 15-30 cybersecurity news headlines. It seems the Facebook Analytica scandal has somewhat died down, or at least no major revelation has been made, but the social media giant will still be in hot waters for a while. Other stories have made headlines however, with a potential customer information theft in a bank, Twitter banning Kaspersky…

ICO Hacking 2018

Hacking Bitcoin Mining Pools and Exchanges
Hacking a Bitcoin mining pool can be useful to crooks as the process involves using the processing power of a group of Bitcoin miners for one’s own benefit. However, doing so is a complicated process. The hackers need to target ISPs and compromise the Border Gateway Protocol (BGP) service, which connects different networks. By compromising…

Cybersecurity news headlines (April 1 – April 15)

Facebook is still remains in hot waters over the Cambridge Analytica scandal, with more troubling information coming to light. The company revealed that a much larger number of Facebook users had their data access by Cambridge Analytica, an estimated 87 million, instead of the 50 million. It then dropped a bombshell, explaining that by abusing a certain Facebook feature, malicious…

9 Ways to Hack Your Bitcoin Wallet

1. Email Phishing
An email arrives in your inbox, seemingly from a service you are familiar with or have used before. The email looks completely legitimate, but it is not. Hackers make their phishing emails look identical to legitimate service emails, with the same formats and design used, thus it can be difficult to differentiate them. In some cases, the company…

Cybersecurity news headlines (March 15 – March 31)

The second half of March has been pretty bad for cybersecurity, mainly because of the Cambridge Analytica scandal, which is one of the biggest to hit the tech world in the last few years. There were also news about data breaches, Microsoft making a questionable decision and Facebook collecting your call history and SMS. Without getting too much into it,…

RSA Tax-related scams in 2018

During the tax filing season, scammers become particularly active, and with the deadline coming closer and closer, you need to be careful. Crooks come up with all kinds of methods to lure out money out of taxpayers, but awareness for these scams is also rising. The IRS (Internal Revenue Service) even has an annual ‘Dirty Dozen’ list with the worst…