Cyber Security In The Crypto World

A number of crypto-currencies have been the victim of ransomware attacks by hackers and some like Ethereum Classic and ZenCash have lost $millions because of blockchain security problems. 

Blockchain has grown rapidly in recent years, but it is not immune to security attacks. Because of the way blockchain works, the data on the chain is potentially viewable by all users and this can lead to both security and privacy issues.

Bitcoin is basically an online currency, it is intangible and decentralised and no government has control over it. Every bitcoin is stored in a “digital wallet” and it uses the blockchain technology where every single transaction is recorded there and although blockchain technology is very secure in theory, it is estimated that 33% of Bitcoin trading platforms have been hacked.

The problem of security comes from the use of keys and the transactions on the blockchain. A key is a set of letters and numbers that is the unique correspondence for your Bitcoin. It is secure, but once you put it into a Bitcoin wallet or on a trading platform, the security of that platform becomes vital. If someone accesses the key, the currency can be removed elsewhereHackers can target this security flaw and use it as a method to steal the money.

The average cost of a data breach for Bitcoin and crypto-currency isn’t known exactly, but the Wall Street Journal has reported that $1.7 billion in crypto-currency has been stolen in recent years.

One of the biggest scams in the history of crypto-currency didn’t come in the form of hacking or a data breach. The whole currency system of OneCoin was a scam. This was a multi-level marketing scam that drew people in with promises of big returns but unfortunately ended up costing people a lot of money. This is proof that hacking is not the only security risk for crypto. There are several cautionary tales.

Cyber threats to crypto-currencies are similar to those in other types of business. You need to treat your accounts on these platforms with a lot of caution.

The untraceable nature of some of the Bitcoin or crypto activity means that for hackers and scammers, it is an ideal target. Huge hacking groups can work on taking down individual accounts, as well as whole crypto platforms. Generally crypto-currency is reasonably safe. You can pay for your coffee with Bitcoin in some parts of the world. However, just like you would exercise caution with your online banking account, you should make sure that you don’t let any potentially exposing data get compromised.

Reuters:    WSJ:        IDStrong:      CNN:   HackerMoon:    Daily Hodl:     Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« Cyber Attacks Are The New Cold War
SANS and AWS Marketplace webinar: Shifting your network security architecture to the cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.