Blockchain Security: 3 Ways to Secure Your Blockchain

Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. Improved data security, faster transactions and cost savings ...
Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for ...
Tineola: Taking a bite out of enterprise blockchain

Tineola: Taking a bite out of enterprise blockchain

Parsia Hakimian and Stark Riedesel presented Tineola at DEF CON 26 Enterprise blockchain platforms are one of the big questions faced by many corporations, including some of our customers. And when our ...
Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages ...
Weekly Security Mashup - July 17, 2018

Hackers target cryptocurrency exchange, new Spectre vulnerabilities, and healthier healthcare

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. Watch the episode below: What’s in this week’s Security Mashup, ...

NIST takes aim at blockchain security hype

Blockchain technology is all the rage right now. Largely because of the glitz of Bitcoin. While the concept of blockchain has been around since the early 1990s, it wasn’t until the advent ...