Cyber Security In The Crypto World

A number of crypto-currencies have been the victim of ransomware attacks by hackers and some like Ethereum Classic and ZenCash have lost $millions because of blockchain security problems. 

Blockchain has grown rapidly in recent years, but it is not immune to security attacks. Because of the way blockchain works, the data on the chain is potentially viewable by all users and this can lead to both security and privacy issues.

Bitcoin is basically an online currency, it is intangible and decentralised and no government has control over it. Every bitcoin is stored in a “digital wallet” and it uses the blockchain technology where every single transaction is recorded there and although blockchain technology is very secure in theory, it is estimated that 33% of Bitcoin trading platforms have been hacked.

The problem of security comes from the use of keys and the transactions on the blockchain. A key is a set of letters and numbers that is the unique correspondence for your Bitcoin. It is secure, but once you put it into a Bitcoin wallet or on a trading platform, the security of that platform becomes vital. If someone accesses the key, the currency can be removed elsewhereHackers can target this security flaw and use it as a method to steal the money.

The average cost of a data breach for Bitcoin and crypto-currency isn’t known exactly, but the Wall Street Journal has reported that $1.7 billion in crypto-currency has been stolen in recent years.

One of the biggest scams in the history of crypto-currency didn’t come in the form of hacking or a data breach. The whole currency system of OneCoin was a scam. This was a multi-level marketing scam that drew people in with promises of big returns but unfortunately ended up costing people a lot of money. This is proof that hacking is not the only security risk for crypto. There are several cautionary tales.

Cyber threats to crypto-currencies are similar to those in other types of business. You need to treat your accounts on these platforms with a lot of caution.

The untraceable nature of some of the Bitcoin or crypto activity means that for hackers and scammers, it is an ideal target. Huge hacking groups can work on taking down individual accounts, as well as whole crypto platforms. Generally crypto-currency is reasonably safe. You can pay for your coffee with Bitcoin in some parts of the world. However, just like you would exercise caution with your online banking account, you should make sure that you don’t let any potentially exposing data get compromised.

Reuters:    WSJ:        IDStrong:      CNN:   HackerMoon:    Daily Hodl:     Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« Cyber Attacks Are The New Cold War
SANS and AWS Marketplace webinar: Shifting your network security architecture to the cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.