Cyber Security In The Crypto World

A number of crypto-currencies have been the victim of ransomware attacks by hackers and some like Ethereum Classic and ZenCash have lost $millions because of blockchain security problems. 

Blockchain has grown rapidly in recent years, but it is not immune to security attacks. Because of the way blockchain works, the data on the chain is potentially viewable by all users and this can lead to both security and privacy issues.

Bitcoin is basically an online currency, it is intangible and decentralised and no government has control over it. Every bitcoin is stored in a “digital wallet” and it uses the blockchain technology where every single transaction is recorded there and although blockchain technology is very secure in theory, it is estimated that 33% of Bitcoin trading platforms have been hacked.

The problem of security comes from the use of keys and the transactions on the blockchain. A key is a set of letters and numbers that is the unique correspondence for your Bitcoin. It is secure, but once you put it into a Bitcoin wallet or on a trading platform, the security of that platform becomes vital. If someone accesses the key, the currency can be removed elsewhereHackers can target this security flaw and use it as a method to steal the money.

The average cost of a data breach for Bitcoin and crypto-currency isn’t known exactly, but the Wall Street Journal has reported that $1.7 billion in crypto-currency has been stolen in recent years.

One of the biggest scams in the history of crypto-currency didn’t come in the form of hacking or a data breach. The whole currency system of OneCoin was a scam. This was a multi-level marketing scam that drew people in with promises of big returns but unfortunately ended up costing people a lot of money. This is proof that hacking is not the only security risk for crypto. There are several cautionary tales.

Cyber threats to crypto-currencies are similar to those in other types of business. You need to treat your accounts on these platforms with a lot of caution.

The untraceable nature of some of the Bitcoin or crypto activity means that for hackers and scammers, it is an ideal target. Huge hacking groups can work on taking down individual accounts, as well as whole crypto platforms. Generally crypto-currency is reasonably safe. You can pay for your coffee with Bitcoin in some parts of the world. However, just like you would exercise caution with your online banking account, you should make sure that you don’t let any potentially exposing data get compromised.

Reuters:    WSJ:        IDStrong:      CNN:   HackerMoon:    Daily Hodl:     Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« Cyber Attacks Are The New Cold War
SANS and AWS Marketplace webinar: Shifting your network security architecture to the cloud »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

LSEC

LSEC

LSEC is a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

CyberCentric

CyberCentric

Using artificial intelligence, we've streamlined the process of managing your most sensitive data, understanding who has access to it, and ensuring that it is only used in the ways you have specified.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.