BlogHide Resteemshacken (36)in cryptoexchange • 6 years agoTransparency Hacking Initiative: New Crowdsourced Framework for Crypto Exchange TransparencyBinance, OKEx, Bitfinex, and Huobi are cryptocurrency exchanges. All of them have a 24-hour trading volume for most popular cryptocurrencies and those numbers vary significantly. Do those numbers…hacken (36)in kyc • 6 years agosteemCreated with Sketch.Does Crypto Have KYCThese days the crypto community is used to hearing bad news whether it’s about the downward heading market, regulation concerns or cybersecurity issues. With all these wash trading and faking…hacken (36)in hacken • 6 years agoPhishing of Crypto Hodlers, Traders, and Stock ExchangesOriginally published in Hacken Blog The crypto community had no other choice but to put up with the fact that there also exists the dark side — a community of various types of scammers and…hacken (36)in hacken • 6 years agoMore than just a Data Breach: a Democratic Fundraising Firm ExposureOn October 17, a member of Hacken cyber risk security team found an unprotected instance in Buffalo TeraStation NAS. NAS (Network Attached Storage) — a portable data storage server that provides…hacken (36)in hacken • 6 years agoInvestigation on fake trade volume of top crypto exchanges: BigONEBig success stories of “newcomer” crypto exchanges still keep us wondering whether it’s just pure luck or a result of manipulative actions. This time we decided to find out how BigONE exchange…hacken (36)in hacken • 6 years agoThe Butterfly Effect or how to counter fake volumes and make the crypto industry matureIn chaos theory, the butterfly effect is the sensitive dependence on initial conditions in which a small change in one state of a deterministic nonlinear system can result in large differences in a…hacken (36)in hacken • 6 years agoHola VPN was hacked: keep your data safeIf you want to surf the internet privately and securely, then you need a VPN. It may seem that using any VPN is the right decision, but it’s not. Let’s consider a VPN browser plugin. It’s almost…hacken (36)in hacken • 7 years agoCER Prelaunch Giveaway Results are LiveEight days ago we started a giveaway dedicated to the release of the closed beta version of CER. Naturally, the most valuable prize was the access to Crypto Exchange Ranks at one time with crypto…hacken (36)in hacken • 7 years agoQ&A session with Dmytro Budorin: community questions. Part 2What is the target price of HKN by the end of Q2? You know when someone doesn’t want to answer the question and aims to shift the focus, he or she replies in a manner something like, “oh, what a…hacken (36)in hacken • 7 years agoCER Prelaunch GiveawayAs you may have heard, on June 1st, the Crypto Exchange Ranks open-beta test was launched! For those who don’t know what is CER, a small remind: Crypto Exchange Ranks will do analysis…hacken (36)in hacken • 7 years agoQ&A session with Dmytro Budorin: community questions. Part 1What separates Hacken from other cybersecurity tokens? The main feature of Hacken is that we provide a wide range of cybersecurity services. This means that HKN token is more functional and…hacken (36)in hacken • 7 years agoSomething About Hacken and Its ProgressDo you remember WINGS endorsing Hacken’s ICO about half a year ago? Since then, Hacken has become a solid company with numerous clients, established partnerships, and quality products. Have a look…hacken (36)in hack • 7 years agoWhy crypto exchanges should care about their security: the case of BithumbToday’s world is all about reputation. Remember Molly’s Game? Thanks to her impeccable reputation as an Olympic-class skier, nobody suspected that she can run underground poker business. The…hacken (36)in hacken • 7 years agoHackenProof is 1 month old!On March 31, slightly more than a month ago, we have launched the alpha version of HackenProof. Hacken’s bug bounty platform is powered by a worldwide community of white hat hackers who hunt down…hacken (36)in cryptowallet • 7 years agoCrypto Wallet Electrum Pro Caught Red-HandedCrypto wallet Electrum Pro sends cryptographic keys of users to a third-party domain Developers of the bitcoin-wallet Electrum warned users about the malicious "clone" of the wallet. The document…hacken (36)in hacken • 7 years agosteemCreated with Sketch.Transcript of Q&A session with Simon CockingOn March 31 the first part of the Q&A session between the interviewee Dmytro Budorin, Hacken's CEO, and Simon Cocking, the interviewer, took place. The community anticipated this event much as they…hacken (36)in hacken • 7 years agosteemCreated with Sketch.Results! #HackenProof Launch Giveaway21, 700, and 8.700 ... What do these figures have in common? #HackenProof Launch Giveaway lasted for 21 days. More than 700 people took part in it. Approximately 8.700 entries have been…hacken (36)in cybersecurity • 7 years agosteemCreated with Sketch.Hacken's Q&A session with Simon Cocking on March 31Well, well, well! Hacken team is super busy with the last preparations for the release of HackenProof! Yes, it will happen tomorrow on March 31, or as we say in Ukraine on February 59, it’s still…hacken (36)in hacken • 7 years agosteemCreated with Sketch.Hacken Starts #HackenProof Launch GiveawayIn a growing cyberspace, one of the many things that please Hacken is loyalty and activity of our community. With more than 3,000 members, we want our community to be broader and take an active part…hacken (36)in blockchain • 7 years agosteemCreated with Sketch.Check Twice Before Blackmailing White Hat HackersRecently, Hacken got a “bug report” from one of our community members. The guy wanted to gain publicity with found vulnerabilities and decided to discuss the topic in our community broad enough on…