The agreement between Bitex and the
Ministry of Security of Argentina will seek to investigate the use of
cryptoactives in illegal activities, as well as they will seek solutions.
In recent publications issued by the...
It is common in the
blockchain and cryptocurrency community that a piece of prominent news directly
affects the price of the world's most influential digital assets, such as
Bitcoin, either positively or negatively depending on the development. It could
be as...
Designers
recommend dividing the seed following the Shamir Backup (SLIP39) method. The
device allows you registering hexadecimal sequences of up to 123 characters.
On October 21st,
the official launch of CryptoSteel Capsule, a solid metal physical...
One of the prevention measures is to
avoid opening emails from strangers, as well as protecting wallets with
two-factor authentication systems.
Researchers in the cybersecurity area alert the
crypto-community about a Trojan virus that takes control...
In recent days, a report
published by the United Nations (UN) implied that North Korea, a nation with a mysterious and highly
controversial government, was behind a hacking attack that, allegedly, netted for said country's
weapons program $2 billion. The...
The company claimed that in September 2018 an update
to its system threw errors. The startup denied that it will change its name.
Bitinka decided to do an audit after receiving notifications from users
who...
The malicious file can recover data such as victim's wallets,
WordPress credentials or install a miner to infect the computer.
Avast.io's
group of researchers, decoded, discovered and denounced a new malicious file
that threatens the mining...
Criminals are always lurking, whether it is the
physical or the digital world: hackers, scammers, and fraudsters have
constantly evolved to keep themselves one step ahead of the security measures,
with the intention of performing their shady operations and make...
The dark web, they say, may be an interesting place to interact, with
things and services not found on regular search engines and browsers. However,
it can also be the host of illegal activities, scammers, money laundering, and
drugs, not...
As part of a plan to counteract the
financing of terrorism and money laundering, this region establishes an
agreement of independent actions where it includes cryptocurrencies as a risk
factor.
As part of a set of...