Bitcoin-cloud mining scam
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
228 articles
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
Virus Bulletin is a traditionally enterprise-focused event, but each year topics of consumer interest, like Apple malware, hackable devices and Bitcoin are presented.
No doubt it has been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin exchange marketplace out there, has shut down, putting a
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
If you haven’t paid for an online transaction in bitcoins yet, chances are you probably will before long. The digital currency that was invented in 2008 has been widely adopted
Bitcoin is a digital crypto-currency. It’s distributed. It’s peer-to-peer, meaning that is controlled by the people that use it. There is no central authority controlling it. There are no international
Episode 362 looks at X’s recent ban, voice-over theft and Apple’s big App store conundrum.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.