ADVERTISEMENT
Advertise with BNC

Latest articles tagged:

Security

1109, 2017

The imperative for self-sovereign identification

|11 Sep 2017|News|

I’m making a presentation on cybersecurity this week at our Nordic Finance Innovation meetings. This meant preparing a few new slides from scratch as I don’t have a set deck for cybercrime, and sat and started ideas just as the news dropped about the Equifax breach. You’ll all know about this by now, but over 143 million Equifax accounts were hacked during June-July 2017, including customers’ social security numbers, name, address, date of birth, driving licence and other sensitive info. In other words, all the information you need to open new accounts and access existing accounts.

2407, 2017

Securing your free “Bitcoin Cash” stash

|24 Jul 2017|News|

In the last days of July 2017, the Bitcoin miners have unanimously decided to signal for Segregated Witness, ending a years long scaling debate discussion. However a few participants decided to reject this decision and create their own Bitcoin fork, Bitcoin Cash (also known as BCC, ABC or UAHF). As a result, all Bitcoin holders will be granted a new duplicated Bitcoin Cash balance (literally airdropped free money) if the fork activates — this post and the follow ups will describe how you can best secure this new balance, then decide to trade it, hold it or sell it as you wish.

1906, 2017

Fintech and Financial Services: Initial Considerations

|19 Jun 2017|Resources|

A new wave of technological innovations, often called “fintech, ” is accelerating change in the financial sector. What impact might fintech have on financial services, and how should regulation respond? This paper sets out an economic framework for thinking through the channels by which fintech might provide solutions that respond to consumer needs for trust, security, privacy, and better services, change the competitive landscape, and affect regulation. It combines a broad discussion of trends across financial services with a focus on cross-border payments and especially the impact of distributed ledger technology. Overall, the paper finds that boundaries among different types of service providers are blurring; barriers to entry are changing; and improvements in cross-border payments are likely. It argues that regulatory authorities need to balance carefully efficiency and stability trade-offs in the face of rapid changes, and ensure that trust is maintained in an evolving financial system. It also highlights the importance of international cooperation.

806, 2017

Letter to Loved Ones: a template for your cryptocurrency estate planning

|8 Jun 2017|News|

Most people have never thought about what will happen to their bitcoin, ether, and other crypto-assets if something bad happens to them. Even if you do understand the concept of passing your crypto-assets to your loved ones, actually doing the work to make it happen is often a daunting prospect. It’s one of those tasks, without a hard deadline, that gets pushed to the end of your to-do list, repeatedly. Most people don’t know where to start and there are very few resources available to help guide you through the process. But it doesn’t have to be that way.

2410, 2016

Bug Analyse Security Report On Blockchain Software

|24 Oct 2016|Resources|

This security audit report of blockchain software by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT) examines 25 open-source blockchain projects, categorizing the vulnerabilities found into 9 classes.

1508, 2016

Bitcoin security is more than multisig

|15 Aug 2016|News|

Following the Bitfinex hack it’s become apparent that people don’t really understand bitcoin’s multisig feature. There seems to be a lot of confusion over what multisig is and isn’t, what it inherently does or does not do. This article aims to clarify some of the most common misconceptions, explain how multisig actually works today, why policy controls aren’t a substitute for organizational security, and what you can do to protect yourself.

1303, 2016

Gone Forever: ​Bitcoin, AltCoins, Asset‐Tokens, & Death

|13 Mar 2016|News|

If you died tomorrow would your family inherit your bitcoin, altcoins, and asset-tokens? The answer depends on you. While legally, the answer is yes, if your passwords, passphrases, and key locations die with you that probably won’t happen. Without those things your crypto-assets will be inaccessible. Like gold coins buried in a meadow; they may know the treasure exists but they’ll never be able to access it.

2202, 2016

Tech Trends 2016 – Innovating in the digital era

|22 Feb 2016|Resources|

The 2016 report identifies eight trends that reflect macro forces fuelling innovation: digital, analytics, cloud, the renaissance of core systems, and the changing role of IT within the enterprise, balanced with the implications of cyber risk—security, compliance, regulatory and compliance, quality, and safety.

1002, 2016

Bitcoin stealing malware evolves again

|10 Feb 2016|News|

There are three traditional ways for malware and viruses to generate bictoins for their creators. Direct theft of private keys from bitcoin wallets, parasitic bots that mine bitcoin with stolen processing power, and Ransomware that encrypts files and demands a bitcoin payment to restore access.

ADVERTISEMENT
Advertise with BNC
BNC Newsletters: A weekly digest of the most important news and analysis.
ADVERTISEMENT
Advertise with BNC
Submit an event on bravenewcoin.com
Latest Insights
ADVERTISEMENT
Advertise with BNC