Blockchain security

Blockchain graphic

Often it the online processes around blockchain and cyrpto-currencies that are exploited by the threat actors, not the blockchain itself – which remains secure. Following a year of research, a report by Trail of Bits, commissioned by the US Government Defense Advanced Research Projects Agency (DARPA) shows that the blockchain …

Google Threat Assessment Group tackles smartphone malware

This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …