Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Software
Posts Tagged ‘blockchain’
Most Recent
 
Read More
December 12, 2016

Is This Blockchain Voting System by NYU Devs the Solution to Russia Election Meddling?

With lingering concerns over ways in which the 2016 election could have been underhandedly swayed in the favor of President-elect Donald J. Trump after Barack Obama requested a report on the matter, a team of blockchain-minded New York University devs have developed a potential answer after winning first prize in a development challenge.

Cybersecurity has been a major issue in elections ever since electronic voting machines were deployed in the early 1990s.

Voting had never been less expensive and easier for the electorate. The rise of cybersecurity, on the other hand, has become a major issue for the underpinnings of Democracy.

It has [...]

195811
 
Read More
December 1, 2016

BoE asks FinTech Firms to Help Warn Banks About Cyberattacks

The Bank of England is recruiting FinTech companies to help prevent cyberattacks targeting financial institutions, according to a report from The Telegraph.

Earlier this year, the Depository Trust & Clearing Corporation (DTCC) conducted a survey, which found that cyber risks topped the list of financial service concerns. According to the survey, 56 percent of respondents ranked cyberattacks within the top five.

Speaking at the Telegraph’s Future of FinTech conference, Claire Sunderland Hay, head of the Bank’s FinTech Accelerator, said one study is focusing on threat intelligence tools.

She said:

We hope [it] will lead to faster sharing of threat [...]

101010
 
Read More
October 21, 2016

Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption

Worried about security for your bitcoin in the face of quantum computing? According to computer researchers, there’s no reason to be.

Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future.

Matthew Amy from Canada’s University of Waterloo proposes just this in a paper by the International Association of Cryptologic Research.

Amy, and researchers from Perimeter Institute for Theoretical Physics and the Canadian Institute for [...]

491626
 
Read More
October 18, 2016

This is the Definitive Crypto Hardware Bitcoin Wallet

TREZOR is one of the best-respected Bitcoin hardware wallets in the industry.

With years of research and development on their side, CEO Alena Vranova working with her team SatoshiLabs is developing TREZOR 2, which the startup says will bring new hardware features to make use easier and more comfortable by introducing a bigger display and an entirely new software stack.

“It becomes super easy to develop any TREZOR security applications or to integrate them into the current systems,” Vranova told Hacked. “The knowledge of Python or JavaScript will be enough for people to code with / for TREZOR.”

Alena Vranova

TREZOR, which is also [...]

287051
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University