
Security
The Bitcoin Masterclasses Day 1: Confidentiality in the realm of Bitcoin and blockchain
Confidentiality differs from privacy in that information is shared with the right people, while maintaining privacy means that data is...
China’s digital yuan wins big in cross-border pilot but potential pitfalls threaten efforts
China's adoption rates of its digital yuan have soared since its introduction, but privacy concerns and a gloomy economic outlook...
Uzbekistan law enforcement trains to combat digital asset crime
In response to the rising cases of digital asset crime, Uzbekistan is conducting a series of training, which include blockchain...
Japan pins years of cyberattacks on North Korea’s Lazarus Group
Law enforcement authorities in Japan have published a public attribution statement claiming Lazarus has been mainly using phishing tactics to...
Is ETH a security? If it wasn’t before, it is now
Ethereum is both a security and tyranny, as staking coins via a third party remains, and the wealthiest holders combining...
Certihash to begin developing an enterprise suite of blockchain information security tools with IBM
Certihash is working on a project to develop “Sentinel Node,” the first of a suite of five blockchain-empowered enterprise utility...
Recent
Trending
Most Views