Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Bitcoin Password Grab Disguised As DDoS Attack
Newest First  |  Oldest First  |  Threaded View
Brian.Dean
Brian.Dean,
User Rank: Apprentice
12/5/2013 | 2:23:02 PM
Re: Misdirected Ingenuity
@Ariella, yes good point, when bitcoin is pegged to the dollar to pay salaries a bit of the volatility is finished, and that to only during the calculated interval, so if salaries were paid on the 2nd of each month and bitcoin falls in value by 10% by the 15th of the month, employees still lose. However at this point, bitcoin as a currency also finishes and the dollar becomes the prime currency again.

Generally speaking, the holders of capital want stability, overall 1% inflation can be good to create incentives to produce but it also comes with negative things such as money illusion.
Ariella
Ariella,
User Rank: Apprentice
12/5/2013 | 12:36:32 PM
Re: Misdirected Ingenuity
@Brian exactly, that's why while such high prices make bitcoin appear attractive, in reality, it is detrimental to its use as currency. Before writing an article on bitcoin for CFO, I contacted the companies that made the news for offering to pay employees in bitcoin. One of them admitted that even he gave up on the offer to take a part of the salary in bitcoin when it proved very volatile last spring -- and that kind of movement is nothing compared to what we've seen in the past few weeks. The way he put it was this:

For example for us the payment of salaries as bitcoins want meant to help people spend bitcoins and get into the ecosystem. Now we feel like we are helping our employees to place bets in a casino. Owning and spending a currency that can double or halve its value in a month is very problematic.
Brian.Dean
Brian.Dean,
User Rank: Apprentice
12/5/2013 | 11:37:27 AM
Re: Misdirected Ingenuity
Ariella, the way I see it is that the more bitcoin is in demand the greater becomes its difficulty, currently $1,000+ per 1 bitcoin shows that it is in high speculative demand. This has created a situation where it is only practical to mine it using ASIC however, the amount of variables that are involved that would allow an ASIC operation to be profitable are just as complex and speculative as would a 'bitcoin trading round' be using dollars, it would be the same as buying a high risk/gain/lose stock. 
samicksha
samicksha,
User Rank: Apprentice
12/5/2013 | 2:39:39 AM
Re: Misdirected Ingenuity
Essence of Bitcoin is its fees are independent of the amount being sent, which makes it attractive for heavy transactions, but despite of this fact, the use of Bitcoin in the retail and commercial marketplace is relatively small compared with a relatively large use by speculators.
Ariella
Ariella,
User Rank: Apprentice
12/4/2013 | 7:07:18 PM
Re: Misdirected Ingenuity
@Mathew Originally, the only way to acquire bitcoins was to mine them. Back in the early days, Im told that was a simple enough computational operation. But as the number of bitcoins diminishes, the mining gets that much more involved to the point that special mining rigs are sold for thousands of dollars. Now that bitcoin has reached such a high, some people who had given up mining when the exchange rate was under a $100 because they did not consider the payoff worthwhile may return to it. However, my guess is that the buying and selling that has sent the digital currency skyrocketing is not due to the activity of miners but to speculators who buy and sell the currency without mining. In any case, the way the Bitcoin system works, the block chain always has to clear any transaction in which the currency passes from one wallet to another in order to guard against counterfeit virtual coins. That's why it can take more than 10 minutes for the transactions to clear.
Brian.Dean
Brian.Dean,
User Rank: Apprentice
12/4/2013 | 3:41:32 PM
Misdirected Ingenuity
If we assume that people that type their user names and passwords rather than using the 'remember me' function are going to be re-using user names and passwords the most, nice model however, extremely misdirected as this sort of ingenuity could have been used to create real value.

And where tool bars are being used to turn private computers into a decentralized mining operation, well again nice model however, it is theft of electricity. The difficulty at which bitcoin is at the moment makes it impractical for anyone to be paying for electricity by hashing through CPUs, GPUs (AMD 7000 series GPUs in particular) are better at hashing and only just manage to break even in terms of electricity usage and coins produced (hardware costs and overheads excluded). Either way, it is still electricity theft, create a decentralized cloud, give customers value and that is when I would appreciate this model.

My point is that individuals should also check their GPU utilization because most probably these tool bars are going to want GPU resources.    


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file