Top 5 Types of Cyber Attacks You will Encounter in 2018

Introduction Every system administrator is worried about hackers. This is because hackers obtain unauthorized access to their system, stealing critical information, locking some files and leaking proprietary data to the public. Honestly, it can be a daunting task for companies to try to recover from such attacks. The breaching of data that occurred at Equifax … Read more

Ledger Addresses Man in the Middle Attack That Threatens Millions of Hardware Wallets

Hardware wallet manufacturer Ledger, which sold over one million devices last year, has alerted its users to a major attack vector that’s recently been discovered. Although there are no reported cases of the attack being successfully deployed, the threat itself is very real. Today, Ledger urged users of its cryptocurrency wallets to take steps to … Read more

Bitpay Starts Implementing Bitcoin Payment Protocol Invoices Decreasing Wallet Support

This week the cryptocurrency payment processor Bitpay implemented the BIP70 Payment Protocol into their debit card bitcoin-to-dollar-load invoices. According to the company, the feature will prevent common payment errors and offer better security against man-in-the-middle attacks. Also Read: Hit BTC Introduces Deposit Charges to Deal With High Bitcoin Fees Using the Payment Protocol to Prevent … Read more