Coinbase to Remove Support for Multisig Vaults Within a Month

Coinbase is removing its support for an advanced security feature that it was not advantageous for the company to maintain. Multisig vaults were originally introduced as a way for customers to manage their private keys and control their own security while still using the same Coinbase interface. Also Read: Survey Says 8% of the American … Read more

How Can Blockchain be Used to Aid Cybersecurity?

With the rapid advancement of internet-based technologies, cybersecurity is a constant cloud looming on the horizon. As the technology evolves, so too, do the cybercriminals. Their constant efforts to steal valuable data and disrupt business through DDoS attacks are increasingly sophisticated. Holding companies hostage and monetizing data through ransomware techniques is sadly par for the … Read more

How Can You Best Protect Your Cryptocurrency?

If you hold cryptocurrency – or plan on doing so – you should seek the advice of an information security professional about the best ways to secure your assets; an expert can evaluate the particulars of your own environment and situation to help you best defend yourself against risk while accomplishing your financial goals.  That … Read more

Hardware Wallet Demand in South Korea Grows Exponentially

According to local reports in South Korea, demand for hardware wallets is increasing exponentially. The demand has stemmed from attempted hacks last year against domestic trading platforms like Upbit and Bithumb. Also read: Lawsuit Challenges Google’s Ban on Crypto Ads in Russia Regional Reports Detail South Korean Hardware Wallet Demand is Rising South Korean cryptocurrency … Read more

15-Year-Old Security Researcher Shares Ledger Wallet Exploit

Hardware wallet manufacturer Ledger has published a firmware update to remedy several security flaws. The exploits were independently found by a trio of white hat security researchers, one of whom, Saleem Rashid, is a 15-year-old British boy. The attack vector he discovered is hardware based, and is not limited to Ledger devices, making it difficult … Read more

Someone Just Spent $2,000 On a $1,000 Gift Card Trying to “Double Spend” BCH

It is a common practice nowadays for online ventures to invite white hat hackers to attack their systems via security challenges or cyber bug hunts. Companies usually do this to learn what vulnerabilities they might have and improve, or to show their confidence in their existing defense capabilities. The method can also be used to … Read more

Token Airdrops Are Taking Off Despite Legal Concerns

They say you get nothing for free in this life, but tokenized projects running airdrops would beg to differ. You can now get a whole lotta crypto assets for free – hundreds of them in fact – simply for signing up and following some social channels. What started as a novelty has become the norm, … Read more