Blockchain and Crypto Security Training – Free
I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013.
I’m sharing my latest blockchain security training material under the Creative Commons...
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
How the Big Binance Bridge Hack Will Change the way People...
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...
The Other Side of NFT – The Scams and the Threats
In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
Quantum Computing Risks to Cryptocurrencies – Bitcoin, Ethereum, and Beyond
Introduction
Cryptocurrencies like Bitcoin and Ethereum derive their security from cryptographic algorithms – mathematical puzzles that are practically impossible for classical computers to solve in...
How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...
The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.
In order to understand...
Proof of Reserve vs. Proof of Liability vs. Proof of Solvency
Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented. In the case of FTX,...
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana.
Early February of 2022 was...
Tracing Private Cryptocurrencies
Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case.
Are popular cryptocurrencies like Bitcoin and Ethereum private?
Absolutely...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...
















