"Ten of these threats involved attacks from hackers rather than something like user error or hardware malfunction. Let’s take a closer look at the ten different ways hackers can try to gain access to your Bitcoin private keys."
Links to the best articles, videos and podcasts about Security in the crypto space.
"When you are storing your bitcoins for a longer term, using a paper wallet ensures maximum safety. In this tutorial, you will learn how you can make a Bitcoin paper wallet."
"Bitcoin is often referred to as a secure timestamping service. We never had a global record of truth with trustworthy timestamps, so how did this come about? It’s generally due to Proof of Work being combined to a few simple rules by which miners must abide."
"Blockchain is hackable but it’s often an expensive and time-consuming process. A blockchain can be hacked via three main avenues: on protocol, in exchanges and via people’s wallets through phishing and other classic online scams.
"Before owning any bitcoin, you need somewhere to store them. That place is called a “wallet.” Rather than actually holding your bitcoin, it holds the private key that allows you to access your bitcoin address (which is also your public key). If the wallet software is well designed, it will look as if your bitcoins are actually there, which makes using bitcoin more convenient and intuitive."
"Breaking down misconceptions about these technologies"
"Every security model has two main parts: assumptions and guarantees. If the assumptions used as inputs hold true, then so should the guarantees that are output by the model."
"The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer."
"Over 300 Twitter accounts are trying to steal your money."
"Within a matter of hours, Coinbase Security detected and blocked the attack. Here’s how it unfolded."
"The following text will guide you through the biggest advantages Security Tokens will bring to us."
"Only 2 percent of the 200,000 bitcoin transactions in the data set were deemed illicit as part of Eliptic’s initial work. While 21 percent were identified as lawful, the vast majority of the transactions, roughly 77 percent, remained unclassified."
"From Mt. Gox and Bitconnect to the recent QuadrigaCX scandal, the staggering amounts involved will make your jaw drop."
"This incredibly expensive approach is an unlikely strategy for Bitcoin fraud"
"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"
"An in-depth guide on how to be safe in the crypto world and the online world in general."
"An incident will happen at some point. Here’s how to respond."
"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."