Tether double spending vulnerability

Cybersecurity Analysts Find Tether Double-Spending Vulnerability

Chinese private cybersecurity firm SlowMist has found a double-spending vulnerability in Tether(USDT) today, June 28. SlowMist states in a tweet that they were able to send USDT to...
Crypto security breaches

From Coincheck to Bithumb: 2018’s Largest Security Breaches So Far

On June 19, Bithumb, South Korea’s number one crypto exchange, was hacked. The attackers stole cryptocurrencies worth $30 million, making it one of the largest...

Ethereum Hard Fork Rescheduled: Here’s When Constantinople Will Finally Launch

As CCN previously reported, the aborted Constantinople network upgrade has created several problems for Ethereum. One of these problems is a significant ...
Malware miner

This Malware Has a Worrying Trick to Mine Monero on Cloud Servers

A recently observed form of malware uses a concerning new trick to avoid detection and mine cryptocurrency on cloud servers.

Blockchain Featured in Big Four Firm Deloitte’s Annual Tech Trends Report

Blockchain is featured as a disrupting technology in the Tech Trends 2019 report published by Big Four audit and consulting firm Deloitte on Jan. 16.
Tron price

Tron Price Analysis: TRX and Tron a Marketing Juggernaut Says Former BitTorrent Executive

The stage is set for NiTron Summit in progress at the Yerba Buena Center for the Arts at 700 Howard Street, San Francisco. In this two-day event where ...

South Africa’s Central Bank Proposes Rules for Crypto Companies

Crypto exchanges and wallet providers would have to register with regulators under rules proposed by South Africa’s central bank.