Articles of security

Research | Blockchain empowers traditional video security surveillance industry

This article was authorized by the author "Murphy's Time" to authorize Babbitt, please do not reprint without permission. After decades of development, the video security surveillance industry has gradually developed into a traditional industry with high market maturity and large scale. Its core product, the IP-based network video surveillance system, has become the core of […]

Blockchain security | 19 security incidents in March, DeFi security issues highlighted

Editor's Note: This article has been deleted without altering the author's original intention. According to the data from the PeckShield situational awareness platform, in the past month, a total of 19 prominent security incidents occurred in the entire blockchain ecosystem. The degree of damage was rated as "intermediate", and the amount of damage reached 10 […]

Discussion on anti-counterfeiting, anti-intrusion and tampering, and blockchain technology to improve the security of drone operations

Author: Lu Yue Feng Ze ice (Information Security Institute, Chinese Academy of Communications, Beijing 100191, China) Source: ICT and Policy Editor's Note: The original title was "Blockchain Enhances Security Analysis of UAV Bee Colony System" Abstract: UAV bee colony operations have scale advantages and cost advantages in the face of high-intensity confrontation and dynamic battlefield […]

Behind "House N" in South Korea: Is Encryption Security Really Safe?

Author: Joyce Source: Blockchain Outpost On March 25, South Korean police conducted a rare public march against a criminal who was one of South Korean "N-room" operators "Dr. Zhao". He runs a series of sex chat rooms on instant messaging Telegram, shoots and uploads perverted videos, and receives hundreds of millions of won of cryptocurrency […]

Chain Security founder Yang Xia talks about asset security issues that ordinary users should pay more attention to behind the whale attack | Chain Node AMA

The recent whale coin loss incident has once again brought SIM card attacks and digital asset security issues to people's attention. From the information available, the giant whale can control the private key by himself (he performed signature verification), and claims to have been attacked by a SIM card. In this regard, the analysis of […]

Depth | A Comprehensive Interpretation of Lightning Loans: Why Will Lightning Attacks Become the New Normal?

Source: Chain News Author: Haseeb Qureshi, Managing Partner of Dragonfly Capital, a cryptocurrency venture capital firm Lightning loans have recently become a hot topic. Two hackers used lightning loans to attack the margin trading agreement bZx . The first arbitrage amount was US $ 350,000 , and then they carried out a pirated attack of […]

DeFi Trust Crisis: Rethinking the bZx Incident

Text: 嚯 嚯 Source: Hive Finance Editor's Note: Original title was "DeFi Trust Crisis" Six days have elapsed since the assets of the DeFi loan agreement bZx were stolen, and the crisis of trust that has grown has not subsided. On February 15th and 18th, the attacker used the "contract loophole" of the DeFi loan […]

Black-producing gang exploits Apache Struts 2 vulnerability and SQL blast control server mining

Source: Tencent Mimi Threat Intelligence Center I. Overview The Tencent Security Miami Threat Intelligence Center detected that the group used the Apache Struts 2 remote command execution vulnerability (CVE-2017-5638) to attack the windows server. From the list of files used by the group, the attack was mainly carried out through blasting or exploit, and targeted […]

Opinion | The open source of hardware wallets does not represent a wallet upgrade, but a major security compromise

Source: Medium_Cobo official blog Compilation: First Class ( Editor's note: The original title was "View: Should Hardware Wallets Be Open Source? 》 As enthusiastic advocates of open source software, we have great respect for pioneer developers who share their work with the world. There is no doubt that we are in the cryptocurrency field and […]

Characters | From the founder of Hyperledger to the creation of a safe $7.5 billion financial technology empire, "pragmatic" thinker Lu Yifan

Reporter | Aholiab Produced | blockchain base camp (blockchain_camp) He was one of the first two founders of the IBM Hyperledger Fabric, the drafter of the Hyperledger white paper; he brought a team of less than 10 people to the current blockchain to more than 80 people today, as a financial valuation of more than […]