Posts Tagged ‘bitcoin’

Most Recent
 
Read More
2018-12-23

History of cryptocurrency incidents

Cryptocurrency is conquering the world rapidly. It is considered that the main distinctive features of cryptocurrency are decentralization, anonymity and security. However, deception, fraud, extortion and hacking are only some of the methods that can be used to steal  your cryptocurrency.

53
 
Read More
2018-08-21

Popular Cryptocurrency Miners

Bitcoin is the most famous cryptocurrency, and the oldest one. Previously, it could be mined using a home computer. It was even possible to use your laptop. Then the situation shifted to the use of GPUs as the complexity of cryptocurrency mining increased. At present, you need specialized intelligent equipment.

59
 
Read More
2018-02-14

Blockchain Myths

The technology of Blochkchain has been heard recently. Blockchain is a way of storing data or a digital register of transactions, transactions, contracts. In the blockroom you can store data about almost everything. Its main difference and undeniable advantage is that this registry is not stored in any one place. It is distributed among several hundreds and even thousands of computers all over the world.

180
 
Read More
2017-12-30

Orcus RAT Overview

Recently, bitcoin has become very popular, which has become the impetus for creating applications for bots, such as Gunbot. Unfortunately, FortiGuards Labs has opened a new phishing campaign that targets investors from bitcoins, offering Gunbot, a relatively new application for beatbox. It serves malicious Orcus RAT software, which leads to a loss of investment, and not vice versa.

87
Latest Headlines
 
Read More
173
 
Read More
111
 
Read More
352

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Chip-off Technique in Mobile Forensics