Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Bitcoin Thefts Surge, DDoS Hackers Take Millions
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
infinitnet
50%
50%
infinitnet,
User Rank: Apprentice
1/3/2014 | 10:51:16 AM
Bitcoin Pools/Exchangers DDoS Protection
The size and amount of DDoS attacks is constantly growing, especially when it comes to Bitcoin - be it Exchangers, Mining Pools, Forums or anything really. Especially Bitcoin mining pools are targeted by DDoS attacks lately and if you operate one, you should always consider to keep it DDoS protected from the beginning, to avoid your miners leaving as soon as a DDoS attack hits.
KashfiyaRafa
50%
50%
KashfiyaRafa,
User Rank: Apprentice
12/22/2013 | 9:15:55 AM
Myriad Development of Bitcoin Platform CryptoCafe.com

Hi,

Bitcoin going to save the global economy, Bitcoins are digital coins transferred from person to person, without using a bank or centralized service. 

Bitcoin is not a system of claims. Bitcoin is a pseudo-commodity, not a claim. People who purchase Bitcoins do not have a claim on anybody, nor does anybody have a claim on them. The biggest difference between bitcoin and other virtual currencies is that bitcoins are the only one which have speculative value. 


CryptoCafe is going to be big in the world of Bitcoin, be sure to sign up for the big  release announcement. The website is owned by a public company called Myriad Interactive, the stock symbol is MYRY and its predicted to be very big!

 

Myriad Interactive Media Begins Development of Bitcoin Platform CryptoCafe.com

Thanks :)

Lorna Garey
100%
0%
Lorna Garey,
User Rank: Ninja
12/2/2013 | 11:22:07 AM
Old advice applies
My dad always told me to buy low and sell high. Seems like BitCoins are akin to junk bonds -- maybe worth buying low at $3 for the novelty, see if they appreciate. But that's not the basis for long-term success as a currency.
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
12/1/2013 | 8:55:04 PM
Re: Bitcoin Banking
The bitcoin is something new but the concept is not. In Internet world there is this kind of inventions. For example, in China a company named Tencent has so-called "Q coin", which you can use for online transaction but it's not equivalent to bitcoin - you cannot use it in exchange for cash. I believe the trend will continue and in the long run the security will be the biggest concern.
vitorleur
50%
50%
vitorleur,
User Rank: Apprentice
11/29/2013 | 1:39:37 PM
Re: Virtual Highway Robbery
As long as the user base will grow so will grow the value of bitcoin. The number of bitcoin wallets on blockchain.info went up from 50 thousands in Jan 2013 to almost 700 thousands now and the growth is accelerating exponentially. The number of users might well grow from 700000 now to over one billion users in 10 years or even before that. At that time everyone will be accepting bitcoins as currency. Since the max number of bitcoins is limited I can only guess what price of bitcoins will be in dollars if dollar will survive by then.
samicksha
50%
50%
samicksha,
User Rank: Apprentice
11/29/2013 | 4:33:01 AM
Re: Virtual Highway Robbery
Bitcoin is currently more of a asset than a currency. And a crash is not the only risk Bitcoin users face. As the price rises, Bitcoin theft is increasing, both from individuals and from online exchanges.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/28/2013 | 5:48:58 PM
Re: Virtual Highway Robbery
Indeed, if your Bitcoins are stolen or lost, it's a lot harder to prove they were yours -- or that you even owned them to begin with!

Some governments are entertaining converting their currencies to entirely digital systems, getting rid of physical cash, so it will be interesting to see how the two systems compare against and evolve with each other.
Brian.Dean
50%
50%
Brian.Dean,
User Rank: Apprentice
11/28/2013 | 5:24:54 PM
Re: Virtual Highway Robbery
Actually, yes you are right, the dollar too is only backed by a belief that everyone will accept it when a transaction needs to be made, and that the reserve bank will not over produce it. That is the case with any economy with a central bank, and gold also has the same assumptions. If more people use the dollar and it gains mass then it will be more stable.
RachelB318
50%
50%
RachelB318,
User Rank: Apprentice
11/28/2013 | 10:14:49 AM
How spend Bitcoin anywhere
Spend bitcoin anywhere in the world. https://www.plazacoin.com/?aff=529451ba4a49d
Shepy
50%
50%
Shepy,
User Rank: Apprentice
11/28/2013 | 7:07:17 AM
Re: Virtual Highway Robbery
"Bitcoin's volatility and insecurity are big turn offs. I'll stick with the dollar. When, if ever, will bitcoin be ready for primetime?"

Yeah, remember when you read that article about 4 million of actual money being accidentally thrown in the skip, like some guy who did so with a bitchain wallet recently in the news...
Page 1 / 3   >   >>


Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
CVE-2020-7222
PUBLISHED: 2020-01-18
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (...