Security


Markets

Poly Network Hacker Starts to Return Drained Funds

The hacker sent millions of dollars back.

clint-patterson-dYEuFB8KQJk-unsplash

Markets

Poly Network Prepares for Hacker to Return Millions in Stolen Crypto

The hacker who stole potentially $600 million from Poly Network asked for a multisig wallet to return the funds.

hacker

Markets

Blockchain Is Secure, but You Are Not

For institutions to move into crypto, they need systems that protect against irreversible mistakes.

CoinDesk placeholder image

Markets

China Unveils Cryptography Research Center to Support Digital Yuan

The institute will be used to develop applications of the technology in an effort to boost security for China's central bank digital currency.

cryptography image

Videos

How to Keep Your Crypto Safe

CoinOS CEO Kris Constable and NextWorldLeader Managing Partner Shannon Allen discuss how crypto holders can protect themselves from hackers and mitigate their cybersecurity risk. "Not your keys, not your crypto," Constable said, echoing the mantra of the digital asset space.

Recent Videos

Videos

Hundreds Arrested in FBI Global Sting Operation Via Encrypted App ‘Anom’

A major law enforcement operation has captured hundreds of crime rings and recovered millions in crypto. The operation involved the surveillance of 27 million messages via an encrypted messaging platform, “Anom.” “The Hash” panel discusses how law enforcement used the encrypted app and what it means for data privacy and security.

CoinDesk placeholder image

Markets

BitMEX Parent Receives ISO Security Certification for Customer Data Management

Certification involves examining possible threats and vulnerabilities within an organization's IT systems.

Screen-Shot-2016-06-28-at-2.25.58-PM

Tech

Monetizing Genomic Data Is the Latest Use Case for NFTs

While NFTs are most widely known for popularity with artists, they are expanding into other areas.

national-cancer-institute-aelk4Tn0vlI-unsplash

Tech

Nym Opens Up Staking in New 'Finney' Testnet to Counter Sybil Attacks

“You need to impose some kind of cost on the attacker to slow down or stop unwanted replication of attackers in your system.”

A robotics lab.