Crypto & Blockchain Security

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...

How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...

Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...

Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy

Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors...

$31 Million Hack of Meerkat Finance

On March 4, 2021 Binance Smart Chain-based yield farming protocol Meerkat Finance lost $31 million in user funds - just one day after launching...

Cybersecurity of Blockchain & Blockchain for Cybersecurity

You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...

$30M Stolen From Grim Finance

DeFi protocol Grim Finance said about $30 million was stolen by hackers exploiting a reentrancy vulnerability in their platform. A security flaw in the...

Proof of Reserve vs. Proof of Liability vs. Proof of Solvency

Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented.  In the case of FTX,...

Cybercrime in China – a Growing Threat for the Chinese Economy

Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...

The Quantum Computing Threat

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...

Introduction to Zero-Knowledge Proofs

Proving knowledge of a secret is the basis of password-based authentication systems.  The assumption is that only you know your password.  If this is...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...

How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...

This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the...

Blockchain and Crypto Security Training – Free

I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013. I’m sharing my latest blockchain security training material under the Creative Commons...

The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts

Code reuse is considered best practice in software engineering.  Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...

Tracing Private Cryptocurrencies

Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely...