{"id":179233,"date":"2017-02-23T12:53:03","date_gmt":"2017-02-23T17:53:03","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-cybersecurity-side-of-cryptocurrency-cso-online\/"},"modified":"2017-02-23T12:53:03","modified_gmt":"2017-02-23T17:53:03","slug":"the-cybersecurity-side-of-cryptocurrency-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/the-cybersecurity-side-of-cryptocurrency-cso-online\/","title":{"rendered":"The cybersecurity side of cryptocurrency &#8211; CSO Online"},"content":{"rendered":"<p><p>        The threats are pervasive. The need for action is clear.        CEOs and board members must manage cybersecurity risks        through proactive engagement.      <\/p>\n<p>    sponsored  <\/p>\n<p>      In 2014, hackers stole about $350 million in bitcoins from      Tokyo's      Mt.Goxexchange.      More recently, attackers successfully moved about $60      millionworth of the virtual currency      ether from the DAO, or      Decentralized Autonomous Organization, to an account      controlled by an unknown      individual or group. Although most - but      not all-      of the funds taken in that theft were later recovered, it was      another reminder that cybercriminals are targeting      cryptocurrencies.    <\/p>\n<p>      Cryptocurrencies, such as      bitcoins and      other digital alternatives,have been      hailedas      representing the future of money and global      finance.Bitcoin, the      first cryptocurrency,was      createdin      2009. Nowadays,hundreds of      typesof cryptocurrencies are in      use, often referred to asaltcoins(an abbreviation of      bitcoin      alternative.) New      altcoinsgetlaunched every      day.    <\/p>\n<p>      Theresreason for the      excitement.The technology lets people and      institutions shift funds instantly and without the need      fora      middleman.Unlike      paper currencies controlled by governments, cryptocurrencies      arefully      decentralizedandoperate      independently of central banks. The digital assets work as      amedium      of exchangeusing principles of      cryptography to secure      transactions.    <\/p>\n<p>      These various digital currencies      have soared in popularity with amarket      capitalizationnow estimated to      bearound$13billion.    <\/p>\n<p>      Butwith regulators and      governments still trying to figure out appropriate legal      structures and business norms governing cryptocurrencies,      cybercriminalsare finding clever      waysto      exploit that window of      opportunity.    <\/p>\n<p>      Regulators still a step behind      the technology    <\/p>\n<p>      A study funded by the Department      of Homeland Security found thatabout33      percentofbitcoin      tradingplatformshave been      hacked.Whats      more, cryptocurrencies now frequently feature as preferred      forms of exchange in ransomware      attacks.    <\/p>\n<p>      In late 2015, a U.K. phone and      broadband provider calledTalkTalkreceived a ransom demand      for 80,000 in bitcoin. Around the same time, three Greek      banks werethreatened with dire      consequences by an entity calling itself the Armada      Collective unless they paid hundreds      of thousands      of Euros,also in      bitcoin. More      recently,a number of hospitals in the      U.S., such as Hollywood Presbyterian Medical Center, have      been attacked by hackers who demanded their victims pay      ransom, also in digital currencies. The common thread in these and      other ransomware incidents: attackers can easily mask      theirtrue      identitieson cryptocurrency      exchanges where they then convert their profits back into      traditional      currencies.    <\/p>\n<p>      As      cryptocurrencies become more      widespread,theresconcern that criminal      actors will try to use them to camouflage their illicit      activities in other arenas,particularly when it comes      tolaundering      funds.In late 2015, for      instance, Dutch policearrested six      peopleon suspicion      ofbitcoin-related money      laundering.Andearly last year, they      arrested another 10 people in connection with a      suspectedglobal      bitcoin      laundering schemevalued at $22      million.    <\/p>\n<p>      Itspart of a trend      thatlaw enforcement      agenciesexpect will gather momentum      in the new year.Andgiven the lack of      independent oversight, criminals already have a head      start.    <\/p>\n<p>      However, none of this is likely      enough to derail the popularity of cryptocurrencies. Every      new technology suffers through growing pains on its way      tobeing      acceptedby the      mainstream.Theresno reason to believe that      cryptocurrencies will be any      different.    <\/p>\n<p>      Charles Cooper has covered      technology and business for the past three decades. All      opinions expressed are his own. AT&T has sponsored this      blog post.    <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.csoonline.com\/article\/3166938\/data-breach\/the-cybersecurity-side-of-cryptocurrency.html\" title=\"The cybersecurity side of cryptocurrency - CSO Online\">The cybersecurity side of cryptocurrency - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The threats are pervasive. The need for action is clear. CEOs and board members must manage cybersecurity risks through proactive engagement <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/the-cybersecurity-side-of-cryptocurrency-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-179233","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/179233"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=179233"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/179233\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=179233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=179233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=179233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}