CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cryptocurrency
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cryptocurrency

Celebrity is hiding face with a hand from newspaper photographers
Data PrivacyInsights

Bans on Privacy Coins Could Have Important Implications for the Future of Privacy

April 2, 2019
Bans on privacy coins by Japan and now possibly France and Texas might make it harder for criminals to conduct certain types of illegal activities but crypto advocates say these bans could actually harm efforts to make privacy a universal human right.
Read More
Image of man in hard hat holding a bitcoin signifying cryptocurrency scams using celebrity twitter accounts
Cyber SecurityInsights

Beware the Latest Cryptocurrency Scams Involving Celebrity Twitter Accounts

March 28, 2018
As prices of cryptocurrencies continue to skyrocket, fraudulent cryptocurrency scams are on the rise. Twitter cryptocurrency scams impersonating celebrities or influencers are so popular with cryptocurrency thieves and hackers simply because they are so easy to pull off on a daily basis.
Read More
Brave browser on mobile showing Brave privacy browser adding affiliate links to cryptocurrency URLs
Data PrivacyNews

Brave Privacy Browser Caught Automatically Adding Affiliate Links to Cryptocurrency URLs

June 22, 2020
Brave privacy browser may have violated FTC and GDPR regulations for automatically redirecting users to affiliate links after they entered the name or URL of cryptocurrency sites.
Read More
Coinbase on mobile phone showing Coinbase transparency report with information requests from US law enforcement agencies
Data PrivacyNews

Coinbase Transparency Report Reveals Vast Majority of Information Requests Come From US Law Enforcement Agencies

October 29, 2020
US law enforcement agencies make up the majority of the information requests and nearly all of the ‘three letter’ players are getting in on the action, from the FBI to the IRS.
Read More
Image showing man in hood watching futuristic screen and cryptojacking Coinhive for Monero
Cyber SecurityInsights

CoinHive, Monero and the Controversial Rise of Cryptojacking

January 12, 2018
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.
Read More
Cryptocurrency bitcoin coin and padlock lock on computer keyboard showing crypto-regulations for virtual currencies
Cyber SecurityInsights

Crypto-Regulation: Regulatory Solutions Will Help Virtual Currencies Change the U.S. Financial Market

February 16, 2019
Many believe that virtual currencies could be a driving force in economic growth. Two new bi-partisan bills will seek to regulate virtual currencies while establishing significant protections for U.S. consumers.
Read More
Man holding Crypto.com debit card in hand showing 2FA bypass in Crypto.com hack
Cyber SecurityNews

Crypto.com Hack Originating From 2FA Bypass Exceeds $30 Million Forcing Refunds and New Security Measures

January 27, 2022
Hackers stole up to $30 million in the Crypto.com hack associated with 2FA bypass, forcing the exchange to refund the victims and migrate to a new 2FA infrastructure.
Read More
Crypto currency mining on computer monitor showing the big impact of Cryptojacking on business
Cyber SecurityInsights

Cryptojacking’s Big Impact on Business

January 17, 2020
Cryptojacking incidents are increasing faster than any other types of cyber incident with reports indicate that it has tripled since 2017. Why are cryptojacking rates on the rise and how do you recognize it?
Read More
Hands in a black gloves holding bitcoin and Ethereum coin showing crypto exchange cyber attack
Cyber SecurityNews

Cyber Attack on Crypto Exchange Liquid Results in Loss of $97 Million in Ethereum Tokens and Other Assets

August 25, 2021
Crypto exchange Liquid, one Japan's most popular exchanges, is now short $97 million in total assets after a cyber attack that pulled funds directly from the wallets of some of its customers.
Read More
Image of cyber criminal holding a futuristic tablet and getting profits from crypto mining malware
Cyber SecurityInsights

Cyber Criminals Profit from Crypto Mining Malware

March 2, 2018
Crypto mining malware is now the weapon of choice for hackers worldwide. The skyrocketing prices of cryptocurrencies is driving the scale of cryptojacking attacks, and can mean very lucrative profits ranging from hundreds of dollars to twenty thousand dollars per month. Victims now include Tesla and the UK government.
Read More
Load More

Latest

Indian government building in New Delhi, India showing big tech companies pushback personal data protection bill

After Pushback From Big Tech Companies, India Scraps Personal Data Protection Bill and Starts Over

Open security lock and key with Twitter in the background showing zero-day security breach impact on anonymous accounts

Twitter Confirms Zero-Day Security Breach Exposed Anonymous Accounts

Judge gavel on the background of the US flag showing federal privacy law impact on tech companies

Tech Companies, Buckle Up. Things Are About To Get Even Bumpier With Data Privacy

Telegram app on a smartphone showing malware and messaging apps

Hackers Exploit Messaging Apps To Distribute Malware and Store Stolen Data

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results