cybersecurity

Users lost more than $2 million in QAnon crypto trading scam
  • Industry News
  • cybersecurity
  • +1

Users lost more than $2 million in QAnon crypto trading scam

Not all influences are created equal. Some provide accurate and insightful information, while others deceive their readers. Unfortunately, some influencers show little integrity and may do more harm than good. The Qanon-linked scams mentioned in this article are dangerous because unsuspecting victims transfer their finances into scammers’ accounts while believing they are investing in the

24 Jun 2022

Proof of Work vs Proof of Stake
  • Discover
  • blockchain
  • +1

Proof of Work vs Proof of Stake

PoW and PoS are the most popular consensus mechanisms used in the blockchain. This article will explain the consensus mechanism, describe PoS and PoW, and explain their differences. Consensus Mechanism Proof of work (PoW) and proof of stake (PoS) are the two most widespread consensus mechanisms in the blockchain. A consensus mechanism is a method

17 Jun 2022

iOS App Penetration Testing
  • Discover
  • cybersecurity
  • +1

iOS App Penetration Testing

After endless rounds of prototyping, you might think that your iOS app is finally ready to be taken off the ground to start creating optimal user experiences. What about vulnerabilities? Whatever it takes, you need to make sure that no bad actor will be able to harvest user-sensitive data through your app. Have your iOS

16 Jun 2022

Is Blockchain Engineering for you?
  • Discover
  • blockchain
  • +2

Is Blockchain Engineering for you?

Blockchain engineer salary and how to become a blockchain engineer? Who is a blockchain engineer? A blockchain software engineer is a person in charge of developing and implementing blockchain technology in Web 3.0 projects. Their primary responsibility is to create/maintain a system connecting their organization’s assets with a public ledger.  Blockchain engineers analyze their company’s

14 Jun 2022

What is Web Application Security, and Why is it Important?
  • Discover
  • cybersecurity

What is Web Application Security, and Why is it Important?

Web Application Security, or Web AppSec in short, is one of the most widely used jargons in the cybersecurity industry for a very good reason.  However, to understand why the tech community is so concerned about web application security, we must take a step back and look at how the present world functions. Today, we

12 Jun 2022

Smart Contract Formal Verification
  • Discover
  • cybersecurity

Smart Contract Formal Verification

Errare humanum est, but a single typo in the code can translate into millions of dollars in losses. In this respect, smart contracts are as prone to errors as any other software. In 2021 alone, $680 million of blockchain-based digital assets secured by smart contracts were lost due to code flaws. According to a recent

10 Jun 2022

Black Box vs. White Box Testing
  • Discover
  • cybersecurity
  • +2

Black Box vs. White Box Testing

Black Box Meaning: Penetration Testing from an end-user perspective Black box means mystery. In software development, black box refers to a testing method where the tester does not know the internals of the tested software. Testing happens without understanding the internal code structure and systems architecture, just like the external party would use it. Black

6 Jun 2022

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story
  • Case Studies
  • bug bounty
  • +1

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story

Gate.io Security Challenge Gate.io is listed among the top 10 crypto exchanges according to CoinMarketCap. Since its founding in 2013, the company has remained committed to making the safety and security of its users its top priority, which requires strong safety measures to protect its traders from hackers and fraudsters. To do this, Gate.io published

1 Jun 2022

“Super fast, great communication, professionalism”: Zone of Avoidance
  • Case Studies
  • cybersecurity
  • +2

“Super fast, great communication, professionalism”: Zone of Avoidance

At the end of April 2022, the project Zone of Avoidance reached Hacken to pass a token smart contract audit. The testing was completed within five days and the project has already received great positive feedback from the community. What is unique in this audit? Find details below. Zone of Avoidance: a brief description of

1 Jun 2022

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo