#security
236 articles found
Latest
Newly revealed documents from a Consensys lawsuit indicate that the SEC's committee approved an investigation named "Ethereum 2.0" in April 2023. According to Fox Business, these documents provide insights into the SEC's evolving views on Ethereum's classification as a security.
Artificial intelligence developers including OpenAI, Anthropic, Stability AI, Google, Meta, and Microsoft have pledged to bolster security measures to protect children during the development and deployment of AI models. This effort is spearheaded by the nonprofits All Tech Is Human and Thorn, dedicated to child safety.
On April 12th, a former senior security engineer for a major international tech company was sentenced to three years in prison. His crimes involved the hacking of two decentralized cryptoexchanges, as well as the theft of over $12 million in digital assets. Top 5 Crypto Smartphones
The impact of blockchain is not limited to finance but extends into other traditional sectors, including smartphone manufacturing. Leveraging the convenience of Android devices and the security of blockchain, developers have crafted comprehensive solutions for cryptocurrency interactions.
The House of Lords Communications and Digital Committee has published a report criticizing the government's approach to artificial intelligence. According to them, the focus on security is overly stringent, potentially stifling the development of new technologies.
The U.S. Securities and Exchange Commission (SEC) filed a court order requiring Ripple (XRP) to disclose its institutional investor information for the last two years. This development stems from a judge's earlier ruling that classified XRP as a security when specifically sold to institutional investors.
CiberInteligenciaSV, the hacking group behind the security breach of El Salvador's state-run Bitcoin wallet Chivo, has started leaking portions of the app's source code. They had already disclosed the personal information of almost all adult users in El Salvador (5.1 million people) who downloaded the wallet.
Microsoft is set to upgrade all of its security systems. The initiative includes accelerating response times to security breaches, enhancing personal data protection, and automating two-factor authentication processes. These upgrades were prompted by a detailed and critical report from the U.S. Cybersecurity Board. GPU Mining in 2024: Comparing GPUs with CPUs and ASICs in Mining
Miners provide computational power to Proof-of-Work blockchain networks to process transactions, create new coins, and ensure network security. The efficiency and results depend greatly on which devices they use. The most common types of crypto mining based on the used hardware are GPU mining, CPU mining, and ASIC mining.
The Unibot Telegram bot for cryptocurrency trading has terminated its partnership with the Unibot on Solana developers, urging them to adopt a new name and to remunerate the community that has supported them for an extended period. According to the Unibot team, this decision was made in the interest of security.
MailerLite, an email marketing platform, has confirmed a security breach leading to the distribution of phishing emails. These fraudulent emails, mimicking various crypto companies, affected 117 entities, including names like WalletConnect, Token Terminal, and the crypto news platform Cointelegraph. 







