Tag Archives: technology

Greatest Online Hack And Attacks – How To NOT Become A Victim!

Greatest Online Hack And Attacks – How To NOT Become A Victim!

The Internet Is Amazing, Yet Ruthless!

While the commercialized version of the internet we know of today began to take shape from the late seventies to the early eighties, many forward thinking investors and entrepreneurs cemented themselves in history and generated a league of long term, generational wealth.

However it hasn’t been plain sailing, the internet has created opportunities for companies such as Microsoft, Cisco, Amazon and so on but also for ‘bad actors’ and fraudulent entities seeking to manipulate, steal and take advantage of people’s vulnerabilities.

In this article, we will be looking at several examples of successful hacks, data breaches and attacks and solutions to help prevent it happening to yourself!

TalkTalk Data Breach

In late 2015, popular UK internet service provider Talktalk announced that up to 157,000 of customers’ data had been compromised.

Reports on the incident detailed the hackers had access to sensitive information such as account details, DOB, addresses and up to 15,000 bank account and sort-code numbers were stolen.

At the time, news of the event triggered Talktalk’s share prices to plummet by about a third of their original value!

The Conficker Worm Of 2008

While this is not the most detrimental example in comparison to others, its longevity is something worth noting.

The Conficker worm is malware software that replicates itself and compromises any machine it gets on to, creating havoc by spamming your device or opening backdoor vulnerabilities by becoming a keyboard logger, meaning any passwords or sensitive information entered on your computer are automatically stored and sent elsewhere without you knowing about it!

Another dangerous feature of this resilient bot, it can deactivate your anti-virus in order to protect itself, it has been going from computer to computer for over eight years and is indeed something to look out for.

Mt Gox Exchange Incident 

Quite possibly the most notorious event in the Bitcoin and Blockchain industry, up until early 2014 Japanese based Mt Gox handled over 70% of the transactional volume of the Bitcoin network and was at the time the largest cryptocurrency exchange in the world.

This was brung to a sudden conclusion as the exchange fell victim to an unforgettable hack and bad actors managed to steal up to 850,000 Bitcoins!

The exchange shortly after declared bankruptcy and with the bulk of Bitcoin transactional volume gone and stolen Bitcoin circulating the eco system, it triggered an eighteen month bear market which effected the entire cryptocurrency markets up until late 2015 and early 2016.

Coincheck

Another cryptocurrency hack, Tokyo based exchange Coincheck experienced the theft of 523 Million NEM coins in early 2018, resulting in over $500 Million stolen from the exchange.

Reports from the exchange detailed that funds held in ‘hot’ (online) wallets had been compromised, since the attack Coincheck has announced it plans to reimburse victims and is in the process of tracking and retrieving the stolen NEM coins.

FBI Hacked By 15 Year Old

In November 2016 a 15 year old boy hacked the servers of the FBI and released detailed information about every undercover agent in the United States!

The data was released on the Dark Web with the most notable point about this hack being that the boy was a total amateur, yet managing to breach the data of what many thought was the most advanced and secure system used by the US Government!

Wannacry Ransomware Attack

An entirely avoidable incident, in May 2017 a worldwide attack was carried out by using the ransomware cryptoworm, which targeted computers running the Microsoft operating system and encrypting the data on the machine.

The hackers demanded Bitcoin if users wanted to restore their computers, and yes some people did pay the ransom! You can view the Bitcoin addresses here!

This rendered computers using older versions of Windows useless, leaving hospitals, businesses and many other computer-orientated industries at the mercy of the hackers, it was later announced that North Korea was behind the incident.

Global Ongoing DDOS Attacks

DDOS or Distributed Denial Of Service Attack is something which happens on a daily basis across the world, you can also view the biggest DDOS attacks online.

How a DDOS works is quite simple, an attacker will literally flood the receiving server with overwhelming amounts of data, overloading its connection and triggering a crash.

The online infrastructure of the West is bombarded with DDOS attacks on a daily basis and anyone from their home can launch an attack, it’s also very common for people to gain the IP of someone from Facebook and flood their internet connection with data.

In the most severe cases when an attacker has the resources a DDOS attack can be extremely disruptive, an example of this is when numerous popular websites, Amazon, Twitter, Netflix and many others became compromised as their servers were literally overloading from extreme levels of data.

Blockchain 51% Attacks And Network Spamming

Even a Blockchain can be rendered useless by similar attacks, a 51% attack is where ‘bad actors’ possess the majority or more than half of the processing power on the respective Blockchain.

With this they can mine empty blocks, slow down the network and generally cause chaos, however for this to be successful on a Blockchain such as Bitcoin or Ethereum’s the ‘bad actors’ will need considerable amounts of processing power, so far the largest Bitcoin mining pools only hold 20% each of the collective processing power.

Spamming the network is again another simple yet effective method of slowing down a Blockchain, providing vast resources are available.

Bitcoin throughout 2017 was spammed with useless transactional data, to the point that its transactional capacity was bloated, this triggered higher transaction fees as the blocks became full.

In late 2016 Ethereum was subject to a vulnerability which meant DDOS attacks could slow down the network’s ability to process information – this resulted in Ethereum forking to patch the vulnerabilities.

How To Avoid Becoming The Victim

Nothing online is 100% impregnable, but there are certain measures that help reduce the risk of being compromised online.

Run regular anti-virus sweeps, Trojans and malware (similar to the Conficker Worm) are extremely dangerous, your computers built in defences and some anti-virus software may not detect it.

Malwarebytes is a free anti-virus, which allows you to scan your device for any suspicious programs, you can delete it after scanning and it usually detects most types of malware, however there are no guarantees of this.

Don’t open suspicious emails, many keyboard loggers and spam bots can use your email to get into your computer, simply by you opening the email allows the malicious program to activate and record all your password entries, website history and even enable it to watch your screen.

Be mindful of who the email is from and keep personal and business emails separate, do not download files from unverified websites, these are likely fraudulent.

Have a work computer and personal computer, it helps to spread risk, having one computer for all your daily tasks can leave you open to being compromised.

If your work device is compromised due to the company being hacked, your personal documents and pictures remain unharmed and vice versa.

Another reason for keeping multiple devices is to prevent individuals from having access to your sensitive and private data.

Phishing, Fake websites and looking out for websites that don’t use HTTPS, in the top right corner of your address bar you will notice a padlock, meaning your information you put in is private (supposedly).

Also this is an excellent way to determine if a website is genuine or not, some websites will literally copy and paste the website template to a fake domain and pretend to be the desired website, many victims from this type of fraud are users of cryptocurrency exchanges.

With a fake login portal you are unwittingly providing bad actors with your username, password and much more!

Never store passwords or private data on a computer or server, for those with cryptocurrency, storing your private key of upmost importance, writing it down on paper and keeping it safe is the ultimate defence, but also not letting websites remember your passwords and debit/credit card information is also key.

Again, as mentioned earlier malware can store every keyboard stroke you enter, only enter financial and personal data on the most trusted and secure websites.

Always be cautious when online, do not trust anything you see and always conduct your own research before signing up or purchasing.

Stellar Lumens (XLM): Is This the Year it Catches Up With Rival Ripple?

Stellar Lumens (XLM): Is This the Year it Catches Up With Rival Ripple?

What is Stellar?

Stellar is a blockchain network that can connect banks, payment systems, and people together using its native digital asset, Lumens. It seeks to make sending value as easy as sending an email.

While Bitcoin uses the proof-of-work algorithm, which requires miners to validate transactions on the network, Stellar uses the open source Stellar Consensus Protocol (SCP):

“The main differences between the Stellar network and Bitcoin are the following:

  • Stellar is based on a consensusalgorithm rather than mining. This means transactions confirm in a few seconds.
  • The supply of lumen increasesat a fixed rate of 1% a year.
  • Stellar aims to let you transact in your currency of choice (fiat or digital).”

Source: https://www.stellar.org/faq/#

Stellar Lumens (XLM): Is This the Year it Catches Up With Rival Ripple?

Source: https://www.stellar.org/papers/stellar-consensus-protocol.pdf

A simplistic way to describe Stellar is by saying that it is a more decentralized version of Ripple and its target user base is not aimed directly at financial institutions, but rather everyday users and technology businesses.

The SCP used by the Stellar network is derived from what Ripple uses, and as I’ll explain later in this article, it has a very intertwined history with Ripple!

Stellar’s Creation and its History With Ripple

Stellar was created from the Ripple protocol, and its co-founder, Jed McCaleb, was one of the original founders of Ripple.

While these two protocols are ultimately attempting to innovate global payments, they take different approaches to it.

Ripple’s primary focus is on innovating the financial institutions’ ability to settle cross-border payments (the very institutions Bitcoin seeks to make obsolete). Stellar is aiming at payment providers, technology companies, and individuals, making its technology available to the community.

The image below, from Bitcoinist.com, compares the differences between these rival digital assets. Interestingly, each time Ripple has experienced a price breakout, Stellar usually follows, similar to the relationship between Bitcoin and Litecoin.

Stellar Lumens (XLM): Is This the Year it Catches Up With Rival Ripple?

“Stellar.org connects people to low-cost financial services to fight poverty and develop individual potential.”

Source: https://www.stellar.org/about/

 

Decentralized Vs. Centralized

Key fundamentals separate these two networks. Stellar is a non-profit organization, and its technology is open source. It uses reserves to fund the Stellar Development Foundation (SDF), which is dedicated to the development of Stellar’s technology and application development within its ecosystem. As pointed out earlier, its target market is the retail user and technology companies.

In contrast to this, Ripple has 60% of its token supply locked up. It’s a for-profit organization that is building a global payment network (RippleNet) with the very institutions that drive down the purchasing power of nations and trigger economic implosions.

As mentioned earlier, Stellar’s technology is based on similar code to Ripple, and while Ripple is clearly the more centralized of the two, it remains to be seen which will emerge as the most efficient protocol. As they each evolve and move into different ecosystems (decentralized and centralized), so will their protocols and the technological requirements to thrive.

Morally and ethically, Stellar is the superior blockchain designed for the people, and it has the innovative ability to stay relevant and compete with Ripple’s technology. It can scale and bridge multiple fiat and cryptocurrencies together at a cost-effective rate.

Stellar’s Innovation and Scalability

The blockchain sector has always embraced entrepreneurism and innovation, as they’re vital for its growth and survival. Stellar embraces this as well, encouraging application and scalability development on its network.

Enter Mobius, a new payment application built on top of the Stellar network. By using the Stellar Consensus Protocol as its foundation, it allows for scalability, speed, and cost-effective transactions in a decentralized manner.

Price Behavior in 2017 and 2018

In 2017, Stellar experienced price growth of over 20,000%, making it one of the top-performing blockchain protocols.

Stellar suffered a brief downturn after peaking at the $0.90 region, as the cryptocurrency markets overall suffered a sharp pullback.

However, against Bitcoin, Stellar has been a strong asset to hold, and it has performed better during this turbulent January 2018 than many other digital assets.

Stellar Lumens (XLM): Is This the Year it Catches Up With Rival Ripple?

Five Reasons to Purchase Stellar Lumens

  • In late 2017 IBM revealed the successful results of a partnership with Stellar, it successfully settled transactions using the native digital asset of the Stellar network, Lumens (XLM).
  • Stellar’s asset Lumen (XLM) is becoming more liquid as the Blockchain space evolves, you can find it listed on most trusted exchanges. This creates a more resilient price and reduces the likelihood of price manipulation.
  • Something which is a hot topic in Blockchain is the regulations on digital assets and how it influences the cryptocurrency sector, Stellar is already compliant with regulators and its foundation is fully active and above board.
  • It has the technology to issue any asset, making it flexible with who can use it while providing the service in a secure and cost effective manner.
  • XLM allows any financial instrument to transfer as a form of money, by digitally representing existing currencies and assets on a fast and scalable network. Scalability is something the Blockchain sector is striving to solve and Stellar’s technology is setting the pace in this regard.

Where to Buy

Poloniex

Kraken

Binance

Bittrex

(Most exchanges will list Stellar Lumens)

Where to Store Privately

Ledger Hardware Wallet

Official Stellar Wallets

 

Disclaimer

This is not investment advice; full critical research is recommended before making any investment decisions.

Please always read the white paper before taking action. Research will provide confidence and help your judgement in these highly-volatile markets.

Zcoin – Built For Anonymous Transactions

Zcoin – Built For Anonymous Transactions

 

What Is Zcoin, Precursor To Zcash?

Zcoin is a privacy-featured cryptocurrency, using Lyra2, which is based on the Proof of Work algorithm similar to Bitcoin and Zcash. It implements the Zerocoin protocol, which enables the encryption of transactions using zk-SNARKS (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge), another feature also similar to Zcash.

Zk-SNARKS work by allowing fully encrypted transactions to be confirmed as valid on the network, the Zerocoin protocol is the precursor to the Zerocash protocol, which was later developed for the Zcash.

How Does It Stand Out Against Rival Privacy Coins

In an industry where regulations are a concern, privacy is something in high demand in the cryptocurrency space, we have seen Monero, Zcash and even Verge rally in volume and price as privacy-focused cryptocurrencies meet the growing needs of the markets.

In the privacy niche there can be more than one winner, utilizing the effective zk-SNARK protocol is a step in the right direction, while Bitcoin transactions do not show user’s personal names or addresses, wallet addresses can be viewed on the Blockchain publicly and transactions can be traced easily.

Price Performance

Over time the Zcoin price has gained momentum, it has performed well against both fiat and bitcoin with many cryptocurrencies only performing well against fiat.

With governments issuing tough laws to tackle money laundering and tax evasion, we could see an explosion in volume and price for privacy-based cryptocurrencies, the fear of regulations could be used to an advantage.

Source: https://coinmarketcap.com/currencies/zcoin/#charts

Where To Buy

Where To Store It

Please remember to invest what you can afford to lose, conduct sound research in all assets before investing.

 

Ark – Connecting Blockchains

Ark – Connecting Blockchains

 

Linking Blockchains Together

With over one thousand different cryptocurrencies and almost as many Blockchains running, each has its own respective eco system and community, if we look at Bitcoin, Litecoin, Ripple and many others they are self-sufficient (providing there is power to make the network run) and evolving into their designed niche…

Imagine if these Blockchains could be linked together!

By using Smart Bridges, the ARK Blockchain can communicate with other Blockchains new and old alike, this could potentially create a multi-Blockchain network utilizing the key features of each chain.

A good example of linking Blockchains is the Atomic Swap application, which will be used by several Blockchains, Bitcoin, Litecoin, Ripple, Vertcoin and others. This enables direct exchange of coins from one Blockchain to another without the need of any exchange or third party, though still in development there have been multiple successful test transactions.

Linking cryptocurrencies and ultimately Blockchains together is the next step for scaling and combining innovative networks, ARK’s Smart Bridge technology could benefit the cryptocurrency space in the long run.

ARK’s algorithm is similar to Lisk, using a Delegated Proof Of Stake algorithm (DPOS), the cryptocurrency itself can used for voting on network solutions and pays up to a 10% ‘dividend’ when you vote for one of the chosen fifty one delegates.

By being able to vote on the network, holders of the coin can make decisions regarding the future of ARK and its development.

The Recent Price Rally

ARK ended 2017 well, with a price rally against the dollar towards the final weeks of the year, ARK also broke out of its downward slope against bitcoin.

Source: https://coinmarketcap.com/currencies/ark/

Where To Purchase

Where To Store