The Blockchain application started in cryptocurrency and has been surging recently. Blockchain has been rapidly expanding to other fields in finance and beyond and is in the process of revolutionizing our society. In this webinar, Blockchain technology will be introduced from the perspectives of applications, extensible interfaces, security promises and
An actor managed to hack the CoinDash official website during the company's ICO (Initial Coin Offering) and diverted over $7 million worth of Ethereum by replacing the official wallet address with their own. The incident took place on Monday, just minutes after the company launched its ICO in an attempt to raise funds in the form of Ethereum
With next gen 'distributed consensus' algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices.
Hackers can shut down entire networks, tamper with data, lure unwary users into cybertraps, steal and spoof identities, and carry out other devious attacks by leveraging centralized repositories and single points of failure.
Announced on October 19 and expected to become a commercial reality by 2017, Fujitsu said in a release that it is currently designing two new types of blockchain-based systems.
The case for using a blockchain boils down to a concept in computer security known as “information integrity.”
The US House of Representatives has passed a non-binding resolution calling for a national technology innovation policy that includes supportive language for digital currencies and blockchain technology.