Security Threats to Blockchain Networks – 3 – Smart Contracts
Smart Contract Risk and How to Mitigate It: A Deep-dive
The strengths of smart contracts are also the source of its weaknesses, and will always...
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy
Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy
Market attacks
Rely on the mass-manipulation of investors...
Security Threats to Blockchain Networks – 2 – A Holistic Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
How the Nomad Bridge Hack can Help Us Explore the Potential...
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing.
Decentralization is a hot-button topic in...
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two...
Gleaming Wisdom from the Strange $170M BitGrail Hack
Around $170M worth of cryptocurrency was allegedly stolen from an obscure Italian crypto exchange called BitGrail in 2018; it’s still unclear exactly how or...
How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...
This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...
Introduction to Blockchain Layers 0, 1, and 2 Security
What Are Blockchains Layers 0, 1, and 2?
A blockchain is a complex, multi-layered system. Bitcoin, the original blockchain, maintained a distributed and decentralized digital...
What the $534M Coincheck Hack Taught Us All About Safe Storage...
The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for...
The Quantum Computing Threat
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
Introduction to Zero-Knowledge Proofs
Proving knowledge of a secret is the basis of password-based authentication systems. The assumption is that only you know your password. If this is...
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...