Cyber Security In The Crypto World

A number of crypto-currencies have been the victim of ransomware attacks by hackers and some like Ethereum Classic and ZenCash have lost $millions because of blockchain security problems. 

Blockchain has grown rapidly in recent years, but it is not immune to security attacks. Because of the way blockchain works, the data on the chain is potentially viewable by all users and this can lead to both security and privacy issues.

Bitcoin is basically an online currency, it is intangible and decentralised and no government has control over it. Every bitcoin is stored in a “digital wallet” and it uses the blockchain technology where every single transaction is recorded there and although blockchain technology is very secure in theory, it is estimated that 33% of Bitcoin trading platforms have been hacked.

The problem of security comes from the use of keys and the transactions on the blockchain. A key is a set of letters and numbers that is the unique correspondence for your Bitcoin. It is secure, but once you put it into a Bitcoin wallet or on a trading platform, the security of that platform becomes vital. If someone accesses the key, the currency can be removed elsewhereHackers can target this security flaw and use it as a method to steal the money.

The average cost of a data breach for Bitcoin and crypto-currency isn’t known exactly, but the Wall Street Journal has reported that $1.7 billion in crypto-currency has been stolen in recent years.

One of the biggest scams in the history of crypto-currency didn’t come in the form of hacking or a data breach. The whole currency system of OneCoin was a scam. This was a multi-level marketing scam that drew people in with promises of big returns but unfortunately ended up costing people a lot of money. This is proof that hacking is not the only security risk for crypto. There are several cautionary tales.

Cyber threats to crypto-currencies are similar to those in other types of business. You need to treat your accounts on these platforms with a lot of caution.

The untraceable nature of some of the Bitcoin or crypto activity means that for hackers and scammers, it is an ideal target. Huge hacking groups can work on taking down individual accounts, as well as whole crypto platforms. Generally crypto-currency is reasonably safe. You can pay for your coffee with Bitcoin in some parts of the world. However, just like you would exercise caution with your online banking account, you should make sure that you don’t let any potentially exposing data get compromised.

Reuters:    WSJ:        IDStrong:      CNN:   HackerMoon:    Daily Hodl:     Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« Cyber Attacks Are The New Cold War
SANS and AWS Marketplace webinar: Shifting your network security architecture to the cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.

Affinity Technology Partners

Affinity Technology Partners

Affinity Technology Partners has been fueling the growth of Nashville, Tennessee businesses and nonprofits with reliable IT services since 2002.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.