Network Time Protocol Vulnerability Threatens Bitcoin Users

Network Time Protocol Vulnerability Threatens Bitcoin Users

Another security threat is looming overhead for Internet and Bitcoin users around the world. The Network Time Protocol, commonly used to ensure electronic devices’ internal clocks are properly synchronized, is vulnerable to tampering. Considering how the communication between a device and the Network Time Protocol is almost never encrypted, a man-in-the-middle-attack becomes highly likely. In this day and age, any form of unencrypted communication is a major security risk. Especially when we are talking about services used by nearly every computer in the world today, such as the Network....


Related News

Sandjacking iOS Exploit Threatens Bitcoin and Ethereum Wallets

Albeit Bitcoin and Ethereum wallets have only recently started appearing on the iOS App Store; cryptocurrency users will need to be extra vigilant. A new hack allows attackers to switch legitimate applications with malicious versions. This also means we may very well see fake bitcoin and Ethereum wallet releases in the future. It has to be said, however, this attack requires the assailant to have physical access to the device in question. To a lot of people, this may apparently mitigate the attack vector, but do not be fooled into thinking the threat is over all of a sudden. The....

Authy Vulnerability Exposed, 2FA Users Affected

During security testing a vulnerability was exposed on the Authy app, a two-factor authentication tool. Less than 0.2% of Authy users were affected. An outside security research team discovered the vulnerability which affects users who changed the phone number on Authy accounts since February 2014. The users affected were no longer able to access their original phone and so thus had to prove phone ownership. This process included government issued ID’s. Authy immediately moved to patch the vulnerability and has no evidence the vulnerability was exploited by nefarious characters. Authy sent....

Hacker Scoops Up $2 Million Bounty After Spotting Fatal Flaw In Ethereum Rollup

A hacker has made off with $2 million in bug bounty after finding an alarming vulnerability with the Ethereum network. This bug could have been very bad if it had been found by black hat hackers who could have exploited the digital asset for billions of dollars worth of ETH. Instead, a ‘grey hat’ hacker popularly known as Saurik informed the Ethereum team of the vulnerability, netting himself a sizable reward in return. Finding The Vulnerability On Ethereum Hacker Saurik had found the vulnerability on Optimism, an Ethereum layer 2 rollup solution. The hacker himself published a report as....

Bitcoin Users Need To Be Aware Of The Dirty Cow Android Exploit

Multiple versions of Android are vulnerable to Dirty Cow, regardless of device manufacturer. Even though mobile devices are becoming more popular than ever before, there are still systemic risks. Mainly the Android operating system seems vulnerable to more attacks than ever before. Dirty Cow, a new vulnerability discovered this week, may affect a lot of Bitcoin users as well. One can never be too careful when dealing with finances. It is not the first time a new Android vulnerability is discovered. Given the sheer popularity of this mobile operating system, hackers have been attracted to....

Lightning network vulnerability discovered, upgrade immediately

The lightning vulnerability was made public on Oct 9. Lightning network node operators running LND versions prior to the Oct. 1 version 0.11 upgrade have been urged to upgrade immediately after a vulnerability was discovered affecting LND versions 0.10 and below.The vulnerability was made public in an Oct. 9 announcement from Lightning engineer Conner Fromknecht, head of cryptographic engineering at Lightning Labs. Fromknecht said:“While we have no reason to believe these vulnerabilities have been exploited in the wild, we strongly urge the community to upgrade to lnd 0.11.0 or above....