This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...
Around $170M worth of cryptocurrency was allegedly stolen from an obscure Italian crypto exchange called BitGrail in 2018; it’s still unclear exactly how or...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
How would you picture those who work to prevent weapons of mass destruction (WMD) from falling into the wrong hands? Would you picture them...
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
Money laundering and terrorism funding both have devastating effects. While acts of terrorism are more noticed because of their highly public nature, Money laundering...
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing.
When a high-profile cyber attack takes place and hundreds of...
Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy
Market attacks
Rely on the mass-manipulation of investors...
Smart Contract Risk and How to Mitigate It: A Deep-dive
The strengths of smart contracts are also the source of its weaknesses, and will always...
Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack
The only way to understand how the Beanstalk Farms decentralized...
Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s...
Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also...
One key to fighting money laundering is understanding its process and the vulnerabilities in each stage of it. In the first stage, the Placement...
Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case.
Are popular cryptocurrencies like Bitcoin and Ethereum private?
Absolutely...
In what ways has financial crime hurt you? Most people would respond with a yawn. We might think it is limited to a few...